• Title/Summary/Keyword: Transmit

Search Result 3,665, Processing Time 0.03 seconds

Future Management Strategies for Zoonoses Based on One Health (원헬스 기반 인수공통감염병의 미래 관리 전략)

  • Lee, Kwan
    • Journal of agricultural medicine and community health
    • /
    • v.44 no.1
    • /
    • pp.39-42
    • /
    • 2019
  • Zoonoses are the diseases that are transmitted to human being from vertebrate animals either from livestock animals or from wildlife. Recently, zoonoses are increasingly common as a result of incremental human-animal contact. Propagative infections in wild animals and livestock are transmitted to human beings who are encountered with them. In general, wild animals can transmit infectious agents to livestock, and then livestock further transmit them to human being is a simple model of on how zoonotic diseases get transmitted to human being. This model emphasizes the importance of early detection of zoonoses by surveillance at its incipient stage. Cooperation between the respective ministries plays an important role in the identification of zoonoses and planning for the formulation of better preventive and control policy and strategy. We will be able to predict the occurrence of zoonotic diseases in human on the basis of disease trends in wildlife and livestock once when we obtain the surveillance data and data generated by respective ministries through sound cooperation and collaboration.

Joint-transform Correlator Multiple-image Encryption System Based on Quick-response Code Key

  • Chen, Qi;Shen, Xueju;Cheng, Yue;Huang, Fuyu;Lin, Chao;Liu, HeXiong
    • Current Optics and Photonics
    • /
    • v.3 no.4
    • /
    • pp.320-328
    • /
    • 2019
  • A method for joint-transform correlator (JTC) multiple-image encryption based on a quick-response (QR) code key is proposed. The QR codes converted from different texts are used as key masks to encrypt and decrypt multiple images. Not only can Chinese text and English text be used as key text, but also symbols can be used. With this method, users have no need to transmit the whole key mask; they only need to transmit the text that is used to generate the key. The correlation coefficient is introduced to evaluate the decryption performance of our proposed cryptosystem, and we explore the sensitivity of the key mask and the capability for multiple-image encryption. Robustness analysis is also conducted in this paper. Computer simulations and experimental results verify the correctness of this method.

Module and Application to Prevent Cell Phone Use While Driving (운전 중 휴대폰 사용 방지 모듈 및 애플리케이션)

  • Kang, Hyeon-Ah;Lee, In-Jeong;Lee, Yoon-Ho;Jeon, Joo-Hyeon;Choi, Won Geun;Joo, Moon G.
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.3
    • /
    • pp.143-150
    • /
    • 2019
  • In this paper, we have developed a module that prevents a driver from using mobile phone while driving. The module is equipped with a vibration sensor to determine if the vehicle is running, a BLE module to transmit the status of the module and a speaker to transmit audible/unaudible sound to the mobile terminal where GUI application is installed. If the vehicle is judged to be moving, the application is activated and the touch function of the mobile phone is blocked. Other data are also transmitted depending on the state of the module, which informs forced module removal, battery failure, or sleep mode of the module.

D2D Tx-Rx Pair Assignment Using Duality Concept

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.19-26
    • /
    • 2019
  • In this paper, we consider the D2D Transmitter(Tx) and Receiver(Rx) pair assignment problem in the cellular system. Sharing the resource of the cellular system, D2D users may cause interference to the cellular system, though it is beneficial to improve the D2D user Capacity. Therefore, to protect the cellular users, D2D transmit power should be carefully controlled. Previously, optimal Tx-Rx assignment to minimize the total transmit power of users was investigated. Accordingly, the iterative algorithm to find the optimum Tx-Rx asignment was obtained. In this work, we consider the case where Tx group users becomes Rx group users, and Rx group users become Tx group users. We prove that the Tx-Rx assignment problem has the duality property. We present the numerical examples that show the duality between U-link and D-link.

Real-time transmission of 3G point cloud data based on cGANs (cGANs 기반 3D 포인트 클라우드 데이터의 실시간 전송 기법)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1482-1484
    • /
    • 2019
  • We present a method for transmitting 3D object information in real time in a telepresence system. Three-dimensional object information consists of a large amount of point cloud data, which requires high performance computing power and ultra-wideband network transmission environment to process and transmit such a large amount of data in real time. In this paper, multiple users can transmit object motion and facial expression information in real time even in small network bands by using GANs (Generative Adversarial Networks), a non-supervised learning machine learning algorithm, for real-time transmission of 3D point cloud data. In particular, we propose the creation of an object similar to the original using only the feature information of 3D objects using conditional GANs.

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity (비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법)

  • Kim, Pyung Han;Ryu, Kwan-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.9
    • /
    • pp.1291-1306
    • /
    • 2022
  • The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

Comparison of two methodologies on spectrum sharing information for unlicensed use in the 6-GHz band

  • Um, Jungsun;Kim, Bongsu;Kim, Igor;Park, Seungkeun
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.531-542
    • /
    • 2022
  • With the increasing demand for unlicensed spectrum, several regulators have been opening up the 6-GHz band for unlicensed use while ensuring compliance with the technical requirement to avoid harmful interference in the existing primary services (PSs). In this paper, we present two methodologies, a channel-based method and a frequency-based method, which are applicable to a frequency coordination system that calculates the permissible transmit power in the channels or frequencies available to a secondary service (SS). In addition, we have demonstrated that the available transmit power of an SS can be maximized by adjusting the power allocation of the assigned resource units under the condition that the channel of the SS is partially overlapped with that of the PS. Based on the analysis results, it is suggested that it would be better to utilize the two methods selectively according to the operating channel conditions of the PS and the SS.

Optimal Power Allocation for NOMA-based Cellular Two-Way Relaying

  • Guosheng, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.202-215
    • /
    • 2023
  • This paper proposes a non-orthogonal multiple access (NOMA) based low-complexity relaying approach for multiuser cellular two-way relay channels (CTWRCs). In the proposed scheme, the relay detects the signal using successive interference cancellation (SIC) and re-generates the transmit signal with zero-forcing (ZF) transmit precoding. The achievable data rates of the NOMA-based multiuser two-way relaying (TWR) approach is analyzed. We further study the power allocation among different data streams to maximize the weighted sum-rate (WSR). We re-form the resultant non-convex problem into a standard monotonic program. Then, we design a polyblock outer approximation algorithm to sovle the WSR problem.The proposed optimal power allocation algorithm converges fast and it is shown that the NOMA-TWR-OPA scheme outperforms a NOMA benchmark scheme and conventional TWR schemes.

Optimum Beamforming Vector Indexing Scheme for Codebook based MISO System over Feedback Error Channel (피드백 오류 채널에서 코드북 기반 MISO 시스템의 최적에 빔포밍 벡터 인덱싱 기법)

  • Lee, Jin-Hee;Ko, Young-Chai
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.991-997
    • /
    • 2009
  • Transmit beamforming is simple method to achieve the full diversity gain that is available in multiple antenna(MIMO) wireless systems. Unfortunately, the prior condition to achieve this gain requires perfect channel knowledge at both transmitter and receiver, which is impractical on account of limited feedback link. Therefore, for the practical system, codebook based feedback scheme is often employed, where the beamforming vector is selected from the codebook to maximize the output signal-to-noise ratio (SNR) at receiver, and the receiver only sends back the index of the best beamforming vector to the transmitter. In this paper we derive analytical expression of average bit error rate (BER) for the codebook based transmit beamforming MISO system over the feedback error channel. Using this analytical result, we present optimum codebook indexing scheme to improve the performance of this system. From some selected numerical examples we show that our proposed codebook indexing scheme can provide nonnegligible performance improvements in terms of average BER over the severe feedback error channel.