• Title/Summary/Keyword: Information and communication technology

Search Result 11,774, Processing Time 0.027 seconds

Trends Research and Development View of Power Line Communication (전력통신을 위한 시장 동향 및 발전 전망)

  • Kim, Ji-Ho;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.573-578
    • /
    • 2008
  • While going through economic development for several decades, Korea has become an industrialized country, and the development of industrial technology accelerated the advent of the information opportunity era. The recent information oriented society has brought forth the development of new information communication technology that enables anybody to obtain information easily and simply, and recently power line communication technology is being developed that allows the use of the existing power line net-works as they are. Each advanced country that faced up to a riffle effect of power line communication technology that enables us to obtain information easily anywhere at anytime is engaged in fierce competition to be a leader in this technology and to preoccupy the standardization of power line communication technology. At this point, this study is to help Korea take the lead in information communication technology by proposing a direction for the standardization that Korean power line communication technology needs to head for by identifying the trend of the worldwide of power line communication technology.

  • PDF

A PERFORMANCE STUDY OF SPEECH CODERS FOR TELEPHONE CONFERENCING IN DIGITAL MOBILE COMMUNICATION NETWORKS

  • Lee, M.S.;Lee, G.C.;Kim, K.C.;Lee, H.S.;Lyu, D.S.;Shin, D.J.;Lee, Hun
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.899-903
    • /
    • 1994
  • This paper describes two methods to assess the output speech, quality of vocoders for telephone conferencing in digital mobile communication networks. The proposed methods are the sentence discrimiantion method and the modified degraded mean opinion score (MDMOS) test. We apply these two methods to Qualcomm code excited linear prediction (QCELP), vector sum excited linear prediction (VSELP) and regular pulse excited-long term predictin (RPE-LTD) voceders to evaluate which vocoding algorithm can process mixed voice signal from two speakers better for telephone conferencing. From the experiments we obtain that the VSELP vocoding algorithm reveals superior output speech quality to the other two.

  • PDF

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

Image Registration Improvement Based-on FFT Techniques with the Affine Transform Estimation

  • Wisetphanichkij, Sompong;Pasomkusolsil, Sanchaiya;Dejhan, Kobchai;Cheevasuvit, Fusak;Mitatha, Somsak;Sra-Ium, Napat;Vorrawat, Vinai;Pienvijarnpong, Chanchai
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.260-262
    • /
    • 2003
  • New Image registration techniques are developed for determining geometric distortions between two images of the same scene. First, the properties of the Fourier transform of a two dimensional function under the affine transformation are given. As a result, techniques for the estimation of the coefficients of the distortion model using the spectral frequency information are developed. Image registration can be achieved by applying the fast Fourier transform (FFT) technique for cross correlation of misregistered imagery to determine spatial distances. The correlation results may be rather broad, making detection of the peak difficult, what can be suppressed by enhancing cross-correlation technique. Yield greatly improves the delectability and high precision of image misregistration.

  • PDF

Information Security Strategy by Risk Factors based on Smart Railway Communications (스마트 철도 통신기반 위험요인에 따른 정보보호 방안)

  • Park, Eun-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.695-702
    • /
    • 2022
  • Smart railway system, which has been actively studied in recent years, is entering the intelligent stage beyond the automation stage based on ICT (Information & Communication Technology) such as communication technology and information technology. ICT technology used in smart railways is generally supported by various information protection technologies as it is vulnerable to information infringement. As a means of high-speed/mass transportation, it is essential to devise an information protection plan for ICT technology that forms the basis for smartening the railway system. Therefore, this paper presents the necessity of step-by-step information protection that measures for smart railway communication by examining potential risk factors of smart railway communication base and considering information protection factors that can respond to them.

CONTINUOUS DIGIT RECOGNITION FOR A REAL-TIME VOICE DIALING SYSTEM USING DISCRETE HIDDEN MARKOV MODELS

  • Choi, S.H.;Hong, H.J.;Lee, S.W.;Kim, H.K.;Oh, K.C.;Kim, K.C.;Lee, H.S.
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.1027-1032
    • /
    • 1994
  • This paper introduces a interword modeling and a Viterbi search method for continuous speech recognition. We also describe a development of a real-time voice dialing system which can recognize around one hundred words and continuous digits in speaker independent mode. For continuous digit recognition, between-word units have been proposed to provide a more precise representation of word junctures. The best path in HMM is found by the Viterbi search algorithm, from which digit sequences are recognized. The simulation results show that a interword modeling using the context-dependent between-word units provide better recognition rates than a pause modeling using the context-independent pause unit. The voice dialing system is implemented on a DSP board with a telephone interface plugged in an IBM PC AT/486.

  • PDF

A 60GHz Wireless Cooperative Communication System Based on Switching Beamforming

  • Shi, Wei;Wang, Jingjing;Liu, Yun;Niu, Qiuna;Zhang, Hao;Wu, Chunlei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1590-1610
    • /
    • 2016
  • The challenge of penetrating obstacles along with impact from weak multipath effects makes 60GHz signal very difficult to be transmitted in non-line of sight (NLOS) channel. So 60GHz system is vulnerable to obstructions and thus likely results in link interruption. While the application of cooperative technology to solve link blockage problemin 60GHz system should consider the characteristic of directional transmission for 60GHz signal. Therefore in this paper a system is proposed to solve the link blockage problem in 60GHz NLOS communication environment based on the concept of cooperation and also the beamforming technology, which is the basis of directional transmission for 60GHz communication system. The process of anti-blockage solution with cooperative communication is presented in detail, and the fast switching and recovery schemes are well designed. The theoretical values of symbol error rate (SER) using decode and forward (DF) cooperation and amplify and forward (AF) cooperation are presented respectively when the common channel interference exists. Simulation results demonstrate that the performance based on DF cooperation is better than the performance based on AF cooperation when directional transmission is used.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

A Study on the Development and Application of Information Communication Technology into Mathematics Education (정보통신기술 활용교육의 수학교과 적용 방안 탐색)

  • 김민경;김유진
    • The Mathematical Education
    • /
    • v.42 no.1
    • /
    • pp.41-56
    • /
    • 2003
  • As the information society appears, the increasing power and access of personal computers along with wide spread use of the information technology has not only changed the landscape for communication but it has opened up new and exciting opportunities for education. One of the ways that information technology could help improve education is to be used in interactive communication to share the knowledge and experience of all the teachers as well as students. In this paper, the use and application of information communication technology[ICT] into mathematics classroom are described and showed several examples. furthermore, the web site design and developed for this study was introduced of the purpose of sharing the ideas about the knowledge and usage of the history of mathematics and examples of mathematical connections. The study suggests that enabling mathematics in incorporating of ICT by teachers and students requires more effort to be made in training teachers on the use and application of ICT into mathematics classroom.

  • PDF