• Title/Summary/Keyword: Channel Searching

Search Result 132, Processing Time 0.026 seconds

Physical Layer Modem Implementation for mmWave 5G Mobile Communication (밀리미터파 5G 이동통신을 위한 물리계층 모뎀의 구현)

  • Kim, Jun-woo;Bang, Young-jo;Park, Youn-ok;Kim, Ilgyu;Kim, Tae Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.51-57
    • /
    • 2016
  • This paper describes the physical layer modem structure of Giga KOREA 5G system which is being developed by ETRI as a 5G telecommunications prototype. The objective of Giga KOREA 5G system is supporting maximum 100 Gbps data rate for each cell with wide-bandwidth baseband station and mobile station prototypes in mmWave (10~40 GHz) environment. To achieve this objective, its physical layer is composed of high performance baseband station as well as mobile station and their OFDM TDD modems. The important features of Giga KOREA 5G physical layer are carrier aggregation, multiple receiving beam searching in mobile station, high data rate channel encoder and decoder and high speed modulation and demodulation functions.

Hierarchical Search-based Fast Schemes for Consecutive Block Error Concealment (연속된 블록 오류 은닉을 위한 계층 탐색 기반의 고속 알고리즘)

  • Jeon Soo-Yeol;Sohn Chae-Bong;Oh Seoung-Jun;Ahn Chang-Beom
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.446-454
    • /
    • 2004
  • With the growth of multimedia systems, compressing image data has become more important in the area of multimedia services. Since a compressed image bitstream can often be seriously distorted by various types of channel noise, an error concealment algorithm becomes a very important issue. In order to solve this problem, Hsia proposed the error concealment algorithm where he recovered lost block data using 1D boundary matching vectors. His algorithm, however, requires high computational complexity since each matching vector needs MAD (Mean Absolute Difference) values of all pixels, which is either a boundary line top or a boundary line bottom of a damaged block. We propose a hierarchical search-based fast error concealment scheme as well as its approximated version to reduce computational time. In the proposed scheme, a hierarchical search is applied to reduce the number of checking points for searching a vector. The error concealment schemes proposed in this paper can be about 3 times faster than Hsia's with keeping visual quality and PSNR.

Measurement of Port Service Quality in Container Transport Logistics Using Importance -Performance Analysis: A Case of Busan Port

  • Ha, Min-Ho;Ahn, Ki-Myung
    • Journal of Navigation and Port Research
    • /
    • v.41 no.5
    • /
    • pp.353-358
    • /
    • 2017
  • This study aims to propose an assessment tool of port service quality (PSQ) in the context of container transport logistics (CTLs), by taking the perspectives from port users. The CTLs defined in this study are the relevant activities of serving the physical flows of a container box from a point of origin via a container port to a point of destination. To address the ports' role in collaboration between its channel members in CTLs, the PSQ measures for all port user groups (i.e. common PSQ measures) are selected based on the relevant CTLs activities involved by port, and its users within terminal/port area as well as throughout the CTLs chain. An importance-performance analysis (IPA) is applied as a diagnostic tool to analyse the status quo of Busan Port in CTLs contexts, by comparing the importance and performance (IP ) scores against each individual CTLs criterion. The findings from the IPA reveal that port managers and policy makers at the Busan Port should concentrate on six PSQ measures (i.e. SR1, SR4, ITS1, VAS1, VAS4, ICI3) to enhance PSQ in CTLs. However, four measures (i.e. ITS2, ITS3, ITS4, VAS2) are identified as a possible overkill, indicating an area of inefficiency where a remedial action of the cost-cutting decision is necessary. On the other hand, the Busan port shows an outstanding performance on four measures such as SR2, SR3, ICI1 and ICI2. The measures are not only important but also high performance. The study findings provide managerial guidance to port managers in Busan Port, in view of searching for managerial and operational strategies for sustainable port growth.

A Study on the Impacts of users' Needs for Cognition(NFC) on the Online Brand Community and Brand Loyalty (사용자의 인지욕구 특성이 온라인 커뮤니티 충성도와 브랜드 태도에 미치는 영향에 관한 연구)

  • Lee, Sun-Ro;Cho, Jung-Hyun;Cho, Sung-Min
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.1-29
    • /
    • 2007
  • The brand-based online community recently plays an important roles for consumers to facilitates searching and sharing information among them. Firms often find such a brand community as a critical channel to gain collective intelligence for developing new ideas and products. As a new web platform such as web 2.0 has been introduced, consumers could more easily participate in the new social networks created by sharing mutual value and belief among themselves. Accordingly firms began to recognize potentials of online brand assets and pay attention to the importance of online brand community loyalty. Previous research related to online community tends to focus on identifying the antecedents of community loyalty and their subsequent impacts on brand. They, however, tend to neglect the importance of individual characteristics of online community users. As integrating the fragmented variables with an individual characteristics, therefore, this study reexamined the impacts of interactivity, information, reward, and personalization services provided by an online brand community on the sense of community, community loyalty, and brand attitude. Also, this study investigated how users' individual characteristics(need for cognition: NFC) can play moderating roles among the variables identified in the previous research. A field survey was administrated and 671 valid samples were collected. In order to test the hypothesis we conducted the multi-sample structural equation modeling(MSEM) between two groups(a group with high vs. a group with low level of NFC). Results show that previously identified variables such as interactivity, information, reward, and personalization services have significant effects on the sense of community as previous research demonstrated. Subsequently, the sense of community positively influences the community loyalty and brand attitude. However, when considering the NFC as a moderating variable, we found that the effect of interactivity and reward service on the sense of community was stronger for a group with a lower level of NFC compared to a group with a higher level, while the effect of information providing service on the sense of community was stronger for a group with a higher level of NFC compared to a group with a lower level. This research revealed that NFC can affect the degree of individual perception on the sense of community which has been considered as an important indicator for the community loyalty and brand attitude. Hence, when firms developing customer relation strategy through building an online brand community, they need to reflect customers' NFC and accordingly provide varying degree of interactivity, information, reward, and personalization services.

Video Matching Algorithm of Content-Based Video Copy Detection for Copyright Protection (저작권보호를 위한 내용기반 비디오 복사검출의 비디오 정합 알고리즘)

  • Hyun, Ki-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.315-322
    • /
    • 2008
  • Searching a location of the copied video in video database, signatures should be robust to video reediting, channel noise, time variation of frame rate. Several kinds of signatures has been proposed. Ordinal signature, one of them, is difficult to describe the spatial characteristics of frame due to the site of fixed window, $N{\times}N$, which is compute the average gray value. In this paper, I studied an algorithm of sequence matching in video copy detection for the copyright protection, employing the R-tree index method for retrieval and suggesting a robust ordinal signatures for the original video clips and the same signatures of the pirated video. Robust ordinal has a 2-dimensional vector structures that has a strong to the noise and the variation of the frame rate. Also, it express as MBR form in search space of R-tree. Moreover, I focus on building a video copy detection method into which content publishers register their valuable digital content. The video copy detection algorithms compares the web content to the registered content and notifies the content owners of illegal copies. Experimental results show the proposed method is improve the video matching rate and it has a characteristics of signature suitable to the large video databases.

  • PDF

A Geographical Study on Characteristics of Political Activities in Cyberspace and Interrelationship between Online and Offline: A case of South Korea's Presidential Election in 2012 (가상공간에서의 정치 활동의 특징과 오프라인 환경과의 연계성에 대한 지리적 고찰: 2012년 대통령 선거를 사례로)

  • Park, Sookyung
    • Journal of the Korean Geographical Society
    • /
    • v.48 no.5
    • /
    • pp.686-708
    • /
    • 2013
  • The goal of this investigation is to examine the matter as to how various cyberpolitical activities such as on-line civic participation, cyber parties, development and movement of civil society networks are appeared in cyberspace; and how political activities in cyberspace are associated with offline environment. This research was based on in-depth and open-ended interviews centering around 20s (32 interviewees) and the major results are as in the following. First, in terms of on-line civic participation, searching political issues occur in places, where internet users can access information easily relatively, and creating or reconstructing political information is identified in places giving stability or affinity to the public society. Second, even though each party's homepage for the channel of cyber parties has enough capacity as bridgespace, which takes charge of supporting f lows of people, goods, capital, and ideas, most of them don't play a role to establish virtual or real networks. Exceptively, cyber parties contribute to make temporalized places, where nobody takes the responsibility, somewhat. Third, the development and movement of civil society networks is divided into several segments according to political interests and tendency in online; furthermore, such a cyberpolitical activity influences human networks and the decision of major places for political activities in offline.

  • PDF

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure (온라인서비스제공자(OSP)의 저작권보호 책임과 필터링)

  • Oh, Yeong-Woo;Jang, Gye-Hyun;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.97-109
    • /
    • 2010
  • Although the primary liability for online copyright infringement may fall on the individual who illegally copies, transfers, and/or distributes the copyrighted content, the issue of indirect liability for Online Service Providers (OSPS) that provide a channel for the distribution of illegal content has recently come under the spotlight. Currently, in an effort to avoid liability for indirect copyright infringement and improve their reputation, most OSPs have voluntarily applied filtering technology. Under the Copyright Act of Korea, special types of OSPS including P2P and Web-based Hard Drive (WebHard) are required to incorporate filtering technology, and may be charged with penalties if found without one. However, despite the clear need for filtering mechanisms, several arguments have been set forth that question the efficacy and appropriateness of the system. As such, this paper discusses the liability theory adopted in the US. -a leader in internet technology development-and analyzes the scope of liability and filtering related regulations in our copyright law. In addition, this paper considers the current applications of filtering as well as limits of the applied filtering technology in OSPS today. Finally, we make four suggestions to improve filtering in Korea, addressing issues such as clarifying the limits and responsibilities of OSPS, searching for cooperative solutions between copyright holders and OSPS, standardizing the filtering technology to enable compatibility among different filtering techniques, and others.

Term Mapping Methodology between Everyday Words and Legal Terms for Law Information Search System (법령정보 검색을 위한 생활용어와 법률용어 간의 대응관계 탐색 방법론)

  • Kim, Ji Hyun;Lee, Jong-Seo;Lee, Myungjin;Kim, Wooju;Hong, June Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.137-152
    • /
    • 2012
  • In the generation of Web 2.0, as many users start to make lots of web contents called user created contents by themselves, the World Wide Web is overflowing by countless information. Therefore, it becomes the key to find out meaningful information among lots of resources. Nowadays, the information retrieval is the most important thing throughout the whole field and several types of search services are developed and widely used in various fields to retrieve information that user really wants. Especially, the legal information search is one of the indispensable services in order to provide people with their convenience through searching the law necessary to their present situation as a channel getting knowledge about it. The Office of Legislation in Korea provides the Korean Law Information portal service to search the law information such as legislation, administrative rule, and judicial precedent from 2009, so people can conveniently find information related to the law. However, this service has limitation because the recent technology for search engine basically returns documents depending on whether the query is included in it or not as a search result. Therefore, it is really difficult to retrieve information related the law for general users who are not familiar with legal terms in the search engine using simple matching of keywords in spite of those kinds of efforts of the Office of Legislation in Korea, because there is a huge divergence between everyday words and legal terms which are especially from Chinese words. Generally, people try to access the law information using everyday words, so they have a difficulty to get the result that they exactly want. In this paper, we propose a term mapping methodology between everyday words and legal terms for general users who don't have sufficient background about legal terms, and we develop a search service that can provide the search results of law information from everyday words. This will be able to search the law information accurately without the knowledge of legal terminology. In other words, our research goal is to make a law information search system that general users are able to retrieval the law information with everyday words. First, this paper takes advantage of tags of internet blogs using the concept for collective intelligence to find out the term mapping relationship between everyday words and legal terms. In order to achieve our goal, we collect tags related to an everyday word from web blog posts. Generally, people add a non-hierarchical keyword or term like a synonym, especially called tag, in order to describe, classify, and manage their posts when they make any post in the internet blog. Second, the collected tags are clustered through the cluster analysis method, K-means. Then, we find a mapping relationship between an everyday word and a legal term using our estimation measure to select the fittest one that can match with an everyday word. Selected legal terms are given the definite relationship, and the relations between everyday words and legal terms are described using SKOS that is an ontology to describe the knowledge related to thesauri, classification schemes, taxonomies, and subject-heading. Thus, based on proposed mapping and searching methodologies, our legal information search system finds out a legal term mapped with user query and retrieves law information using a matched legal term, if users try to retrieve law information using an everyday word. Therefore, from our research, users can get exact results even if they do not have the knowledge related to legal terms. As a result of our research, we expect that general users who don't have professional legal background can conveniently and efficiently retrieve the legal information using everyday words.