• Title/Summary/Keyword: Header length

Search Result 32, Processing Time 0.029 seconds

A Macroblock-Layer Rate Control with Adaptive Quantization Parameter Decision and Header Bits Length Estimation (적응적 양자화 파라미터 결정과 헤더 비트량 예측을 통한 매크로블록 단위 비트율 제어)

  • Kim, Se-Ho;Suh, Jae-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2C
    • /
    • pp.200-208
    • /
    • 2009
  • A macroblock layer rate control for H.264/AVC has the problem that allocated target bits for current frame occasionally are exhausted too fast due to inadequate quantization parameter assignment. In this case, the maximum permissible quantization parameter is used to encode for remaining macroblocks and it leads to degradation of the visual quality. In addition, the header bits length estimation algorithm used for quantization parameter assignment takes the average header bits length for the encoded macroblocks of the previous frame and the current frame. Therefore, it generates a big mismatch between the actually generated header bits length and the estimated header bits length. In this paper, we propose adaptive quantization parameter decision method to prevent early exhausting target bits during encoding the current frame by considering the number of macroblocks that have negative targets bits in previous frame and the improved header bits length estimation scheme for accurate quantization parameter decision.

A Study on the input butter for efficient processing of MPEG Audio bitstream (MPEG Audio 비트스트림의 효율적 처리를 위한 입력 버퍼에 관한 연구)

  • 임성룡;공진흥
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.181-184
    • /
    • 2000
  • In this paper, we described a design of the input buffer system for efficiently dealing with MPEG audio bitstream to demux header and side information, audio data. In order to overcome the limitations of fixed-word manipulation in bitstream demuxing, we proposed a new variable length bit retrieval system with FSM sequencer supporting MPEG audio frame format, and serial buffer demuxing audio stream, FIFO circular buffer including header and side information.

  • PDF

A study on the brittle characteristics of fused silica header driven by piezoelectric actuator for laser assisted TC bonding (레이저 열-압착 본딩을 위한 압전 액추에이터로 구동되는 용융실리카 헤더의 취성특성에 관한 연구)

  • Lee, Dong-Won;Ha, Seok-Jae;Park, Jeong-Yeon;Yoon, Gil-Sang
    • Design & Manufacturing
    • /
    • v.13 no.4
    • /
    • pp.10-16
    • /
    • 2019
  • Semiconductor chip is bonded to the substrate by melting solder bumps. In general, the chip bonding is applied by a Reflow process or a Thermo-Compression(TC) bonding process. In this paper, we introduce a Laser Assisted Thermo-Compression bonding (LATCB) process to improve the anxiety of the existing process(Reflow, TC bonding). In the LATCB process, the chip is bonded to the substrate by irradiating a laser with a uniform energy density in the same area as the chip to melt only the solder bumps and press the chip with a Transparent Compression Module (TCM). The TCM consists of a fused silica header for penetrating the laser and pressurizing the chip, and a piezoelectric actuator (P.A.) coupled to both ends of the header for micro displacement control of the header. In addition, TCM is a structure that can pressurize the chip and deliver it to the chip and solder bumps without losing the energy of the laser. Fused silica, which is brittle, is vulnerable to deformation, so the header may be damaged when an external force is applied for pressurization or a displacement differenced is caused by piezoelectric actuators at both ends. On the other hand, in order to avoid interference between the header and the adjacent chip when pressing the chip using the TCM, the header has a notch at the bottom, and breakage due to stress concentration of the notch is expected. In this study, the thickness and notch length that the header does not break when the external force (500 N) is applied to both ends of the header are optimized using structural analysis and Coulomb-Mohr failure theory. In addition, the maximum displacement difference of the P.A.s at both ends where no break occurred in the header was derived. As a result, the thickness of the header is 11 mm, and the maximum displacement difference between both ends is 8 um.

Implementation of a High Speed GEM frame Synchronization Circuit in the G-PON TC Sublayer Payload (G-PON TC 계층 유료부하 내에서 고속 GEM 프레임 동기회로 구현)

  • Chung, Hae;Kwon, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.469-479
    • /
    • 2009
  • The GEM frame is used a mean to deliver the variable length user data and consists of the header and the payload in the G-PON system. The HEC field of header protects contents of the header and is used to maintain GEM frame synchronization at the same time. When an LCDG (Loss of GEM Channel Delineation) occurs while receiving frames, the receiver have to discard corrupted frames until acquiring the synchronization again. Accordingly, high-speed synchronization method is required to minimize the frame loss. In this paper, we suggest not only a main state machine but a sub-state machine to reduce the frame loss when undetectable errors occurred in the GEM header. Also, we provide a more efficient and fast parallel structure to detect the starting point of the header. Finally, the proposed method is implemented with the FPGA and verified by the logic analyzer.

A Design of Expandable IC Card Operating System (확정성 있는 IC 카드 운영체제의 설계)

  • 박철한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.49-60
    • /
    • 1999
  • IC 카드의 하드웨어적인 제약으로 대부분의 IC 카드는 대칭키 알고리즘을 사용하고 있지만 IC 카드 하드웨어 제조 기술의 발전으로 앞으로는 보안성이 우수한 비대 칭키 알고리즘이 많이 사용될 것이다. 그리고 IC 카드의 가장 큰 제약적 중 하나는 메모리 용량의 한계이다. 따라서 보안상 안전하면서도 메모리를 적게 사용하는 IC 카드 운영체제의 구현을 중요한 문제이다. 그래서 본 논문에서는 다양한 종류의 키 알고리즘을 수용할 수 있는 키 파일 탐색 기법을 제안하였다. 또한 데이터 파일 헤더에 잠금 필드를 삽입하여 보안성을 향상시켰으며 메모리 사용량을 줄일 수 있도록 데이터 파일 헤더만을 이용한 파일 탐색 기법과 자유 공간 탐색 기법을 제안하였다. Because of the evolution of IC card hardware fabrication technologies IC card will be able to accept asymmetric key encryption algorithm in the future. One of the most restrictive points of IC card is memory capacity. Therefore it is an important problem to design a secure IC card operating system using memory in small. In this paper we proposed a key file search mechanism using a key length field inserted in a key file header structure. The key file search mechanism makes IC card execute any key-based encryption algorithm. In addition we proposed inserting a lock field in data file header structure. The lock field intensifies the security of a data file. Finally we proposed a data file search mechanism and free space search mechanism using only data file header. The file system using these mechanisms spends smaller memory than that using a file description table and record of unallocated space.

Efficient Coding of Motion Vector and Mode Information for H.264/AVC (H.264/AVC에서 효율적인 움직임 벡터와 모드 정보의 압축)

  • Lee, Dong-Shik;Kim, Young-Mo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1359-1365
    • /
    • 2008
  • The portion of header in H.264 gets higher than those of previous standards instead of its better compression efficiency. Therefore, this paper proposes a new technique to compress the header of H.264. Unifying a sentence elementary in H.264, H.264 does not consider the distribution of element which be encoded and uses existing Exp-Golomb method, but it is uneffective for variable length coding. Most of the header are block type(s) and motion vector difference(s), and there are redundancies in the header of H.264. The redundancies in the header of H.264 which are analyzed in this paper are three. There are frequently appearing symbols and non-frequently appearing symbols in block types. And when mode 8 is selected in macroblock, all of four sub-macroblock types are transferred. At last, same values come in motion vector difference, especially '0.' This paper proposes the algorithm using type code and quadtree, and with them presents the redundant information of header in H.264. The type code indicates shape of the macroblock and the quadtree does the tree structured motion compensation. Experimental results show that proposed algorithm achieves lower total number of encoded bits over JM12.4 up to 32.51% bit reduction.

  • PDF

Input-buffered Packet Switch with a Burst Head Addressable FIFO input buffering mechanism (버스트 헤더 주소 방식의 FIFO 입력 버퍼링 메카니즘을 사용하는 입력 버퍼 패킷 스위치)

  • 이현태;손장우;전상현;김승천;이재용;이상배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.1
    • /
    • pp.117-124
    • /
    • 1998
  • As window sized increases, the throughput input-buffered packet switch with a window scheme improves on random traffic condition. However, the improvement diminishes quickly under bursty traffic. In this paper, we propose Burst Head Addressable FIFO mechanism and memory structure having search capability in unit of burst header to compensate the sensitiveness of the windowed scheme to bursty traffic. The performance of a input-buffered switch using the proposed Burst Header Addressable FIFO input buffer was analyzed using computer simulations. The maximum throughput of the conventional FIFO scheme approaches an asymptotic value 0.5 as mean burst length increases. The maximum throughput of the proposed scheme is greater than that of the conventional scheme for any mean burst length and window size.

  • PDF

Analysis of AMR Compressed Bit Stream for Insertion of Voice Data in QR Code (QR 코드에 음성 데이터 삽입을 위한 AMR 압축 비트열 분석)

  • Oh, Eun-ju;Cho, Hyun-ji;Jung, Hyeon-ah;Bae, Joung-eun;Yoo, Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.490-492
    • /
    • 2018
  • This paper presents an analysis of the AMR speech data as a basic work to study the technique of inputting and transmitting AMR voice data which is widely used in the public cell phone. AMR consists of HEADER and Speech Data, and it is transmitted in bit format and has 8 bit-rate modes in total. HEADER contains mode information of Speech Data, and the length of Speech Data differs depending on the mode. We chose the best mode which is best to input into QR code and analyzed that mode. It is a goal to show a higher compression ratio for voice data by the analysis and experiments. This analysis shows improvement in that it can transmit voice data more effectively.

  • PDF

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

Performance Evaluation of Post-installed Anchor according to Sleeve Length and Header Length (슬리브 및 헤드 길이에 따른 후설치 앵커의 인발성능평가)

  • Hur, Moo-Won;Chae, Kyoung-Hun;An, Yeong-Seung;Park, Tae-Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.2
    • /
    • pp.8-15
    • /
    • 2021
  • This study presents post-installed anchors whose heads and extension sleeves are improved. The optimal lengths of the extension sleeves and headers were analytically determined by simulations. As a result of analysis using Finite element method (FEM), 9.0mm and 3.0mm were determined as the optimal lengths of sleeves and headers respectively. In pull-out tests using the improved post-installed anchors, all specimens satisfied the coefficient of variation of 15%. Comparing the pull-out strengths of existing anchors and the improved anchors, it was increased by 1.25 times for anchors embedded with a depth of 50mm, and 1.54 times for 70mm. In the cases of high-strength concrete, the strengths were increased by 1.28 and 1.55 times for 50mm and 70mm respectively. Moreover, as a result of shear tests, the improved anchors perform the greater strength of 1.38 times than the existing anchors.