• Title/Summary/Keyword: Convergence technique

Search Result 2,430, Processing Time 0.034 seconds

A study of Development of Transmission Systems for Terrestrial Single Channel Fixed 4K UHD & Mobile HD Convergence Broadcasting by Employing FEF (Future Extension Frame) Multiplexing Technique (FEF (Future Extension Frame) 다중화 기법을 이용한 지상파 단일 채널 고정 4K UHD & 이동 HD 융합방송 전송시스템 개발에 관한 연구)

  • Oh, JongGyu;Won, YongJu;Lee, JinSeop;Kim, JoonTae
    • Journal of Broadcast Engineering
    • /
    • v.20 no.2
    • /
    • pp.310-339
    • /
    • 2015
  • In this paper, the possibility of a terrestrial fixed 4K UHD (Ultra High Definition) and mobile HD (High Definition) convergence broadcasting service through a single channel employing the FEF (Future Extension Frame) multiplexing technique in DVB (Digital Video Broadcasting)-T2 (Second Generation Terrestrial) systems is examined. The performance of such a service is also investigated. FEF multiplexing technology can be used to adjust the FFT (fast Fourier transform) and CP (cyclic prefix) size for each layer, whereas M-PLP (Multiple-Physical Layer Pipe) multiplexing technology in DVB-T2 systems cannot. The convergence broadcasting service scenario, which can provide fixed 4K UHD and mobile HD broadcasting through a single terrestrial channel, is described, and transmission requirements of the SHVC (Scalable High Efficiency Video Coding) technique are predicted. A convergence broadcasting transmission system structure is described by employing FEF and transmission technologies in DVB-T2 systems. Optimized transmission parameters are drawn to transmit 4K UHD and HD convergence broadcasting by employing a convergence broadcasting transmission structure, and the reception performance of the optimized transmission parameters under AWGN (additive white Gaussian noise), static Brazil-D, and time-varying TU (Typical Urban)-6 channels is examined using computer simulations to find the TOV (threshold of visibility). From the results, for the 6 and 8 MHz bandwidths, reliable reception of both fixed 4K UHD and mobile HD layer data can be achieved under a static fixed and very fast fading multipath channel.

A New Available Bandwidth Measurement Technique with Accurate Capacity Estimation (정확한 고정대역폭 추정을 통한 새로운 가용대역폭 측정 기법)

  • Cho Seongho;Choe Han;Kim Chong-kwon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.495-507
    • /
    • 2005
  • Measuring the end-to-end available bandwidth in the Internet is a useful tool for distributedapplication services or QoS (Quality-of-Service) guarantee. To measure the end-to-end available bandwidth, Single-hop Gap model-based packet train measurement techniques are well-known. However, the error of packet train output gap can happen by network topologies. This error of the output gap causes the inaccuracy of the available bandwidth measurement. In this paper, we propose a new end-to-end available bandwidth measurement technique with accurate capacity measurement and fast convergence methods. To solve the erroneous capacity measurement problem of the back-to-back packet train transmission, we propose a new available bandwidth measurement method by decoupling the capacity measurement with the initial gap of the packet train. Also, we propose a new technique to predict the proper initial gap of the packet train for faster convergence. We evaluate our proposed method by the simulation in various topologies comparing with previous methods.

Probing Organic Ligands and their Binding Schemes on Nanocrystals by Mass Spectrometric and FT-IR Spectroscopic Imaging

  • Son, Jin Gyeong;Choi, Eunjin;Piao, Yuanzhe;Han, Sang Woo;Lee, Tae Geol
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.355-355
    • /
    • 2016
  • There has been an explosive development of nanocrystal (NC) synthesis and application due to their composition-dependent specific properties. Despite the composition, shape, and size of NCs foremost determine their physicochemical properties, the surface state and molecule conjugation also drastically change their characteristics. To make practical use of NCs, it is a prerequisite to understand the NC surface state and the degree to which they have been modified because the reaction occurs on the interface between the NCs and the surrounding medium. We report in here an analysis method to identify conjugated ligands and their binding states on semiconductor nanocrystals based on their molecular information. Surface science techniques, such as time-of-flight secondary-ion mass spectrometry (ToF-SIMS) and FT-IR spectroscopy, are adopted based on the micro-aggregated sampling method. Typical trioctylphosphine oxide-based synthesis methods of CdSe/ZnS quantum dots (QDs) have been criticized because of the peculiar effects of impurities on the synthesis processes. Since the ToF-SIMS technique provides molecular composition evidence on the existence of certain ligands, we were able to clearly identify the n-octylphosphonic acid (OPA) as a surface ligand on CdSe/ZnS QDs. Furthermore, the complementary use of the ToF-SIMS technique with the FT-IR technique could reveals the OPA ligands' binding state as bidentate complexes.

  • PDF

Design and Implementation of Virus Test Simulation using VMware (VMware를 이용한 바이러스 테스트 시뮬레이션 설계 및 구현)

  • 이중식;이종일;김홍윤;전완근
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.199-207
    • /
    • 2002
  • Comes in into recent times and there is on with a level where the attack against the computer virus and the hacking which stand is serious. The recently computer virus specific event knows is the substantial damage it will be able to occur from our life inside is a possibility of feeling. The virus which appears specially in 1999 year after seemed the change which is various, also the virus of the form which progresses appeared plentifully The part virus does it uses the password anger technique which relocates the cord of the oneself. Hereupon consequently the vaccine programs in older decode anger to do the password anger of the virus again are using emulation engine. The password anger technique which the like this virus is complicated and decode anger technique follow in type of O.S. and the type is various. It uses a multi emulation engine branch operation setup consequently from one system and to respect it will be able to use a multiple operation setup together it will use the VMware which is an application software which it does as a favor there is a possibility where it will plan 'Virus Test Simulation' and it will embody.

  • PDF

A Study for the MPEG-4 Library to operate in real-time on the DSP (DSP상에서 실시간 처리 가능한 MPEG-4 Library에 관한 연구)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.1
    • /
    • pp.7-13
    • /
    • 2011
  • Informations of multimedia centering in the images, are combined acoustic and letter, etc. Although the network advances and the capacity of the storage media extends, these huge informations will not be able to accommodate. From meaning which is like this, International standards for the compression and a multiplexing of image, acoustic and voice H261 where admits standard, JPEG, JBIG, MPEG-l, MPEG-2, MPEG-4 and H263, G series etc, are core techniques of multimedia. At initial step of the base technique which creates the base of like this multimedia service time, we developed the real-time MPEG-4 transmission systems to provides real-time MPEG-4 multimedia services. This system means becomes the base technique which hereafter is developed and is applied various system. This system Will be able to apply from a videoconference, a building protection system and a VOD video system to use the Internet. And, They, the image sensing, embedded linux, and MPEG4 software, will become sourceful technique to develop the different system.

Evaluation of the Utility of Self Produced MRI Radiofrequency Shielding Material (자체 제작한 자기공명영상 고주파 차폐체의 유용성 평가)

  • Lee, Jin-Hoe;Lee, Bo-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.89-94
    • /
    • 2020
  • This paper proposes a better shielding method to over sampling technique. The new method uses aluminum foil for RF shielding. As a result of the phantom test, when the over-sampling technique was applied, the aliasing artifact was reduced by about 94% compared to before the application, and the case where the aluminum shielding band was applied was also reduced by about 92% compared to before application. In addition, the scan time also increased by more than 3 times in the case of the over-sampling technique, while it was found that there was no change from before the application of the aluminum shielding band Therefore, it was confirmed that the shielding band using aluminum foil can effectively remove aliasing artifacts without increasing the scan time..

Adaptive Equalization Algorithm of Enhanced CMA using Minimum Disturbance Technique (최소 Disturbance 기법을 적용한 향상된 CMA 적응 등화 알고리즘)

  • Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.55-61
    • /
    • 2014
  • This paper related with the ECMA (Enchanced CMA) algorithm performance which is possible to simultaneously compensation of the amplitude and phase by appling the minimum disturbance techniques in the CMA adatpve equalizer. The ECMA can improving the gradient noise amplification problem, stability and roburstness performance by the minimum disturbance technique that is the minimization of the equalizer tap weight variation in the point of squared euclidiean norm and the decision directed mode, and then the now cost function were proposed in order to simultaneouly compensation of amplitude and phase of the received signal with the minimum increment of computational operations. The performance of ECMA algorithm was compared to present MCMA by the computer simulation. For proving the performance, the recovered signal constellation that is the output of equalizer output signal and the residual isi and Maximum Distortion charateristic and MSE learning curve that are presents the convergence performance in the equalizer and the overall frequency transfer function of channel and equalizer were used. As a result of computer simulation, the ECMA has more better compensation capability of amplitude and phase in the recovered constellation, and the convergence time of adaptive equalization has improved compared to the MCMA.

Prevention Methods for the Leakage and Crime of Industrial Technique in South Korea: Focused on the CPTED (한국 산업기술 유출 및 범죄 방지 방안: 환경설계를 통한 범죄예방을 중심으로)

  • Lee, Tae-Young;Sung, Yong-Eun
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.151-160
    • /
    • 2015
  • According to the document from the National Industrial Security Center in 2015, from 2003 to 2014 the disclosure number of industrial spy in South Korea was 438, and the damages due to the industrial technology leakages amounted 50 trillion won annually. Because the industrial technology leakage exercises great influence on the enterprises and the country. countermeasures against industrial technology leakages should be established. Therefore, the purpose of this research is to suggest measures preventing industrial technology leakages and related crimes in enterprises by applying the Crime Prevention Through Environmental Design(CPTED) technique. This research analyzed the recent technology leakage cases and used an analysis of literature research. From the result of this research, we suggested 1) Access Control, 2) Surveillance Enhancement, 3) Territoriality of Reinforcement, and 4) Activity Support by applying the CPTED technique for preventing industrial technology leakages. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.

Intrusion Detection Technique using Distributed Mobile Agent (Distributed Mobile Agent를 이용한 침입탐지 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae;Yang, Jeong Mo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.69-75
    • /
    • 2012
  • MANET(Mobile Ad-hoc Network) is target of many attacks because of dynamic topology and hop-by-hop data transmission method. In MANET, location setting of intrusion detection system is difficult and attack detection using information collected locally is more difficult. The amount of traffic grow, intrusion detection performance will be decreased. In this paper, MANET is composed of zone form and we used random projection technique which reduces dimension without loss of information in order to perform stable intrusion detection in even massive traffic. Global detection node is used to detect attacks which are difficult to detect using only local information. In the global detection node, attack detection is performed using received information from IDS agent and pattern of nodes. k-NN and ZBIDS were experimented to evaluate performance of the proposed technique in this paper. The superiority of performance was confirmed through the experience.