• Title/Summary/Keyword: Digital IF

Search Result 2,212, Processing Time 0.034 seconds

Performance Evaluation of Underwater Acoustic Communication in Frequency Selective Shallow Water (주파수 선택적인 천해해역에서 수중음향통신 성능해석)

  • Park, Kyu-Chil;Park, Jihyun;Lee, Seung Wook;Jung, Jin Woo;Shin, Jungchae;Yoon, Jong Rak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.95-103
    • /
    • 2013
  • An underwater acoustic (UWA) communication in shallow water is strongly affected by the water surface and the seabed acoustical properties. Every reflected signal to receiver experiences a time-variant scattering in sea surface roughness and a grazing-angle-dependent reflection loss in bottom. Consequently, the performance of UWA communication systems is degraded, and high-speed digital communication is disrupted. If there is a dominant signal path such as a direct path, the received signal is modeled statistically as Rice fading but if not, it is modeled as Rayleigh fading. However, it has been known to be very difficult to reproduce the statistical estimation by real experimental evaluation in the sea. To give an insight for this scattering and grazing-angle-dependent bottom reflection loss effect in UWA communication, authors conduct experiments to quantify these effects. The image is transmitted using binary frequency shift keying (BFSK) modulation. The quality of the received image is shown to be affected by water surface scattering and grazing-angle-dependent bottom reflection loss. The analysis is based on the transmitter to receiver range and the receiver depth dependent image quality and bit error rate (BER). The results show that the received image quality is highly dependent on the transmitter-receiver range and receiver depth which characterizes the channel coherence bandwidth.

Reduction of Authentication Cost Based on Key Caching for Inter-MME Handover Support (MME 도메인간 핸드오버 지원을 위한 키캐싱 기반 인증비용의 감소기법)

  • Hwang, Hakseon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.209-220
    • /
    • 2013
  • Handover is the technology to minimize data lose of mobile devices and make continuous communication possible even if the device could be moved from one digital cell site to another one. That is, it is a function that enables the mobile user to avoid the disconnection of phone conversations when moving from a specific mobile communication area to another. Today, there are a lot of ongoing researches for fast and efficient hand-over, in order to address phone call's delay and disconnection which are believed to be the mobile network's biggest problems, and these should essentially be resolved in all mobile networks. Thanks to recent technology development in mobile network, the LTE network has been commercialized today and it has finally opened a new era that makes it possible for mobile phones to process data at high speed. In LTE network environment, however, a new authentication key must be generated for the hand-over. In this case, there can be a problem that the authentication process conducted by the hand-over incurs its authentication cost and delay time. This essay suggests an efficient key caching hand-over method which simplifies the authentication process: when UE makes hand-over from oMME to nMME, the oMME keeps the authentication key for a period of time, and if it returns to the previous MME within the key's lifetime, the saved key can be re-used.

Phantom of the AAPM CT imaging evaluation Studies on the quantitative analysis method (CT 정도관리 영상의 정량적 분석방법에 관한 연구)

  • Kim, Young-su;Ko, Seong-Jin;Kang, Se-Sik;Ye, Soo-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.271-274
    • /
    • 2016
  • CT quality assurance imaging evaluation and enforcement as quantitative assessment by phantom image evaluation, assessment items include There are also contrasting the water attenuation coefficient, uniformity, noise, resolution, spatial resolution, 10mm slice thickness evaluation, contrast resolution, space for the resolution, the slice thickness evaluation, it is possible to estimate the error due to the evaluation by the subjective judgment of the tester, using a subjective error image processing program to be computed to minimize the objective evaluation. Basic recording conditions of the CT image quality control assessment is the same as special medical equipment quality control checks, the images were evaluated quantitatively using IMAGE J. For a CT attenuation coefficient, the uniformity, noise evaluation, were evaluated as CT quality control image the standard deviation of the measured value of the digital processing of image smaller and less noise uniform images than the, contrast and resolution assessment is the size of the diameter of a circle having a large the 1 inch, 0.75 inch, 0.5 inch quality if the diameter of the circle, was evaluated in the small circle in the near circle ellipse. Spatial resolution is evaluated by using a self-extracting features of an image processing program, all of the groups of members comprising the acceptance criteria to automatically extract, was evaluated to be very useful for the quantitative assessment. When CT image quality control assessment on the basis of the results such as the above, if using an image processing program to minimize the subjective judgment of the error evaluator and is determined more efficient than would be made quantitative evaluation.

  • PDF

A Study on the Development Direction of New Media Art Using Virtual Reality (가상현실을 활용한 뉴미디어아트의 발전 방향에 관한 연구)

  • Park, Chan-Ik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.97-102
    • /
    • 2020
  • With the advancement of technology, there are almost no constraints on expression in virtual reality (VR) art; however, it still has some limitations. VR artists can be largely classified into two groups in terms of style. The first group is artists who create their works as a live performance. In this case, a major limitation is that the artist cannot see how the audience reacts to the work because he/she wears a VR device while performing, and the audience cannot fully experience the work, since they view it only on-screen without any VR devices. This problem can be solved if all members of the audience wear VR devices; however, that requires astronomical costs and brings about another problem related to device management. If the price of VR devices decreases as technology develops, it may help solve this problem. The second group is exhibition artists who regularly display their works online. In this case, the limitation is that their work using VR remains only in the virtual digital space. In this case, a solution may be creating space in exhibition halls, and providing VR devices to audience members in existing art exhibitions.

A Legal Review of Personal Information Protection for Invigorating Online Targeted Advertising: Focusing on the Concept of Personal Information (온라인 맞춤형 광고 활성화를 위한 개인 정보 보호에 대한 법적 고찰: '개인 정보'의 개념을 중심으로)

  • Cho, Jae-Yung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.492-497
    • /
    • 2019
  • This study analysed the legal concept of personal information(PI), which was not differentiated from behavioral information, and established it clearly for invigorating online targeted advertising(OTA), which draw attention in big data era; by selecting Guidelines of Assessment of Data Breach Incident Factors and Guidelines of Measures for No-Identifying Personal Information based on Personal Information Protection Act(PIPA) and Enforcement Decree of the PIPA. As a result, PI was defined as any kind of information relating to (1)a living individual(not group, corporate body or things etc.); (2)makes possibly identify the individual by his or her identifiers such as name, resident registration number, image, etc. (not included if not identify the individual); and (3)including information like attribute values which makes possibly identify any specific individual, if not by itself, but combined with other information which can be actually collected and combined). Specifically, PI includes basic, proper distinguishable, sensitive and other PI. It is suggested that PI concept should be researched continually with digital technology development; the effectiveness of the Guidelines of PI Protection in OTA, the legal principles of PI protection from not only users' but business operators' perspectives and the differentiation between PI and behavioral information in OTA should be researched.

Comparative Analysis between Super Loop and FreeRTOS Methods for Arduino Multitasking (아두이노 멀티 태스킹을 위한 수퍼루프 방식과 FreeRTOS 방식의 비교 분석)

  • Gong, Dong-Hwan;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.133-137
    • /
    • 2018
  • Arduino is a small microcomputer that is used in a variety of industry fields and especially is widely used as an open source hardware IoT device. The multi-tasking method of Arduino is divided into super loop timing and RTOS thread method. The super loop timing method is simple and easy to understand. However, when one task is long, it affects the execution of the next task. In addition, RTOS threading has the advantage of being able to run without being influenced by other work time. However, Arduino, a small microcomputer, has a disadvantage in that, when the number of threads increases, the context switching time of the thread causes additional time not included in the super loop timing method have. In this paper, we use Arduino Uno R3 and FreeRTOS to analyze these different features, and the task for the experiment is to send 8000 digital signals to the built-in LED port. If two tasks of the same size are executed, the super loop method executes 3 ms faster than FreeRTOS multitasking. If multiple tasks are executed simultaneously, superloop type task is sequential execution and difference in execution time between first task and last task is large. FreeRTOS method can be executed concurrently, but execution time delay of about 30 ms occurs in context switching time.

Correcting the gaze depth by using DNN (DNN을 이용한 응시 깊이 보정)

  • Seok-Ho Han;Hoon-Seok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.123-129
    • /
    • 2023
  • if we know what we're looking at, we can get a lot of information. Due to the development of eye tracking, Information on gaze point can be obtained through software provided by various eye tracking equipments. However, it is difficult to estimate accurate information such as the actual gaze depth. If it is possible to calibrate the eye tracker with the actual gaze depth, it will enable the derivation of realistic and accurate results with reliable validity in various fields such as simulation, digital twin, VR, and more. Therefore, in this paper, we experiment with acquiring and calibrating raw gaze depth using an eye tracker and software. The experiment involves designing a Deep Neural Network (DNN) model and then acquiring gaze depth values provided by the software for specified distances from 300mm to 10,000mm. The acquired data is trained through the designed DNN model and calibrated to correspond to the actual gaze depth. In our experiments with the calibrated model, we were able to achieve actual gaze depth values of 297mm, 904mm, 1,485mm, 2,005mm, 3,011mm, 4,021mm, 4,972mm, 6,027mm, 7,026mm, 8,043mm, 9,021mm, and 10,076mm for the specified distances from 300mm to 10,000mm.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

Full mouth rehabilitation with reorientation of occlusal plane using facial scan: a case report (교모 환자에서 안면 스캔을 활용하여 교합 평면을 재설정한 전악 보철 수복 증례)

  • Eun-Gyeong Kim;Sae-Eun Oh;Jee-Hwan Kim
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.62 no.1
    • /
    • pp.64-71
    • /
    • 2024
  • The most critical aspect of full-arch prosthodontic treatment is evaluating whether the patient's vertical occlusal dimension is appropriate, and if necessary, restoring it through increasing vertical dimension. If the vertical occlusal dimension is too low, it can lead to reduced chewing efficiency, as well as not only aesthetic concerns but also potential issues like hyperactivity of muscles and posterior displacement of the mandible. This report is about the patient dissatisfied with pronunciation and aesthetics due to an inappropriate vertical occlusal dimension resulting from prior prosthetic interventions, underwent full-arch prosthodontic restoration treatment. Through the utilization of digital diagnostic apparatus, a comprehensive evaluation was undertaken for patient's vertical occlusal dimension, occlusal plane orientation, and the condition of prosthetic restorations. Through 3D facial scanning, the facial landmarks were discerned, and subsequently, the new occlusal plane was established. This provided the foundation for a digitally guided diagnostic wax-up. An elevation of 5 mm from the incisor was determined. Comprehensive dental rehabilitation was then executed for all remaining teeth, excluding the maxillary four incisors. The treatment protocol followed a systematic approach by initially creating implant-supported restorations on both sides of the dental arch to establish a stable occlusal contact. Subsequently, prosthetic restorations for the natural dentition were generated. Diagnostic and treatment planning were established through the utilization of facial scanning. This subsequently led to a reduction in treatment complexity and an expedited treatment timeline.

Improvement of Signal Processing Circuit for Inspecting Cracks on the Express Train Wheel (고속 신호처리 회로에 의한 고속철도 차륜검사)

  • Hwang, Ji-Seong;Lee, Jin-Yi;Kwon, Suk-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.579-584
    • /
    • 2008
  • A novel nondestructive testing (NDT) system, which is able to detect a crack with high speed and high spatial resolution, is urgently required for inspecting small cracks on express train wheels. This paper proposes an improved signal processing circuits, which uses the multiple amplifying circuits and the crack indicating pulse output system of the previous scan-type magnetic camera. Hall sensors are arrayed linearly, and the wheel is rotated with static speed in the vertical direction to sensor array direction. Each Hall voltages are amplified, converted and immediately operated by using, amplifying circuits, analog-to-digital converters and $\mu$-processor, respectively. The operated results, ${\partial}V_H/{\partial}t$, are compared with a standard value, which indicates a crack existence. If the ${\partial}V_H/{\partial}t$ is larger than standard value, the pulse signal is output, and indicates the existence of crack. The effectiveness of the novel method was verified by examine using cracks on the wheel specimen model.

  • PDF