• Title/Summary/Keyword: bit data

Search Result 2,279, Processing Time 0.084 seconds

Diagnosis and Improvement of mode transition delay in Linux 9bit serial communications (리눅스 9비트 시리얼통신에서 모드전환 지연원인의 분석과 개선)

  • Jeong, Seungho;Kim, Sangmin;Ahn, Heejune
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.21-27
    • /
    • 2015
  • We analyze the problem that is occurring when using parity mode transformation required for 9 bit serial communication under Linux environment and propose the solution. The parity mode change is used for 9 bit serial communication in the Linux that by nature supports only 8 bit serial communication. delay (around OS tick) arises. Our analysis shows that the cause is minimum length of waiting time to transmit data remained in Tx FIFO buffers. A modified Linux serial driver proposed in this paper decreases the delay less than 1ms by using accurate time delaying. Despite various system communication interfaces, enormous existing standards and system have adopted RS-232 serial communication, and the part of them have communicated by 9bit serial.

Mean time delay variation performane of DTTL bit synchronizer (DTTL 비트동기장치의 평균시간지연 편차 성능에 관한 연구)

  • 김관옥
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2401-2408
    • /
    • 1997
  • The measured pulse shapes provided in the given data package demonstrated pulse distortions due to laser speckle. the distorted pulse shapes were carefully analyzed, modeled, and then applied to the DTTL(Digital-data Transition Tracking Loop)[1] bit synchronizer simulator to measure the mean time delay and its delay variation performance. The result showed that the maximum mean time delay variation with the modeled data was 12.5% when window size equals 1. All the data given were located within this modeled boundary and the maximum eman time delay variation was 7% in this case. The mean time delay variation was known to be smaller by reducing the window size [2][5][6]. The mitigated delay variation was 2.5% in the modeled case and 1.4% in the data set given when the windown size equals 0.1. With the digital DTTL insteal of analog DTTL, similar results was obtained.

  • PDF

Minimizing Data Frame in CAN Controller Area Network for Humanoid Robot (CAN 기반 휴머노이드 로봇에서의 데이터 프레임 최소화)

  • Kwon, Sun-Ku;Huh, Uk-Youl;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2806-2808
    • /
    • 2005
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay. In order to eliminate this jitter, stuff bit must be controlled to minimize the response time and reduce the variation of data transmission time. At first, this paper shows that conventional CAN protocol causes the transmission time delay. Secondly, this paper proposes the method to reduce the stuff bits by restriction of available identifier. Finally, data manipulation method can be reduced the number of stuff-bits in the data field. The proposed restriction method of ID and manipulating data field are pretty useful to the real-time control strategy with respect to performance. These procedures are implemented in local controllers of the ISHURO (Inha Semyung Humanoid Robot).

  • PDF

Tactile Transfer and Display Method using Data Glove and Vibration Motors Module (데이터 글로브와 진동모터를 이용한 촉각전달 및 제시 방법)

  • Kang, Hyung-Gu;Choi, Youngjin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.12
    • /
    • pp.1138-1144
    • /
    • 2013
  • This paper proposes a tactile transfer and display method between a data glove and vibration motors module. The data glove is developed to capture the hand postures and to measure the grip forces. The measured data are simplified with the proposed 5-bit transfer and display algorithm, and the vibration motors module is developed to display the measured hand posture and grip force to the operator. The proposed 5-bit algorithm contains both an 8-step hand posture and 4-step grip force level information for tactile transfer to the vibration motors module. Also, the effectiveness of the proposed method is shown through several experiments.

Implementation of Multiple Access Serial Communications with Improved Transmission Control (전송효율을 개선한 다중접속 직렬통신 구현)

  • Lee, Young-Suk;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2971-2973
    • /
    • 2000
  • In this paper, we proposed the implementation of multiple access serial communications with improved transmission control. For serial communications. RS232 protocol is used and the transmitting data and is merged to form data channel. Multiple host access is configures by using the common data channel and ground channel. 8bit data transfer with variable frame size is transferred by using the 16bit host ID. Packet is composed of HEADER, receiver ID. variable length data frame, TAIL and CRC informations. Multiple hosts are allowed to transfer packet with the other hosts through the common communication channel. Byte-stuffing is used to differentiate the transfer rate of PC is performed.

  • PDF

An improved technique for hiding confidential data in the LSB of image pixels using quadruple encryption techniques (4중 암호화 기법을 사용하여 기밀 데이터를 이미지 픽셀의 LSB에 은닉하는 개선된 기법)

  • Soo-Mok Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2024
  • In this paper, we propose a highly secure technique to hide confidential data in image pixels using a quadruple encryption techniques. In the proposed technique, the boundary surface where the image outline exists and the flat surface with little change in pixel values are investigated. At the boundary of the image, in order to preserve the characteristics of the boundary, one bit of confidential data that has been multiply encrypted is spatially encrypted again in the LSB of the pixel located at the boundary to hide the confidential data. At the boundary of an image, in order to preserve the characteristics of the boundary, one bit of confidential data that is multiplely encrypted is hidden in the LSB of the pixel located at the boundary by spatially encrypting it. In pixels that are not on the border of the image but on a flat surface with little change in pixel value, 2-bit confidential data that is multiply encrypted is hidden in the lower 2 bits of the pixel using location-based encryption and spatial encryption techniques. When applying the proposed technique to hide confidential data, the image quality of the stego-image is up to 49.64dB, and the amount of confidential data hidden increases by up to 92.2% compared to the existing LSB method. Without an encryption key, the encrypted confidential data hidden in the stego-image cannot be extracted, and even if extracted, it cannot be decrypted, so the security of the confidential data hidden in the stego-image is maintained very strongly. The proposed technique can be effectively used to hide copyright information in general commercial images such as webtoons that do not require the use of reversible data hiding techniques.

Performance Evaluation focused on Burst of Smoothing Algorithms (스무딩 알고리즘들의 버스트 성능 평가)

  • Lee, Myoun-Jae
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.111-118
    • /
    • 2012
  • The burst is to require abruptly high transmission rate in case of transmitting pre-stored variable bit rate video data, and it causes to be inefficient use of network resource, resource reservation. To avoid these problems, smoothing is transmission plan where variable rate video data is converted to a constant bit rate stream. These smoothing algorithms include CBA, MCBA, MVBA and others. To evaluate amount of burst reduction in the existing CBA, MCBA, MVBA algorithm, this paper compares the burst-related-factors of transmission plan in smoothing algorithms with original video sources which were stored Variable Bit Rate. There are maximum frame bytes, maximum GOP bytes, transmission rate variability per frame, transmission rate variability per GOP in burst-related evaluation factors. Experimental result shows burst-related factors of smoothing algorithms which were used for experiment lower than that of pre-stored video data, except special case.

Parallel Transmission and Recovery Methods of Images Using the Two Dimensional Fiber-Optic Code-Division Multiple-Access System (2차원 광부호분할 다중접속 시스템에 의한 영상의 병렬 전송과 복원법)

  • Lee, Tae-Hoon;Park, Young-Jae;Seo, Ik-Su;Park, Jin-Bae
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.12
    • /
    • pp.683-689
    • /
    • 2000
  • Two-dimensional(2-D) fiber-optic code-division multiple-access(FO-CDMA) system utilizes the optical orthogonal signature pattern code(OOSPC) to encode and decode 2-D data. Encoded 2-D data are spatially multiplexed and transmitted through an image fiber and receiver recovers the intended data by means of thresholding process. OOSPC's construction methods based on expansion of the optical orthogonal code, which is used in one-dimensional(1-D) FO-CDMA system, are introduced. Each OOSPC's performances are compared by using the bit error rate(BER) of interfering OOSPC's of other users. From the results we verify that a balanced incomplete block design(BIBD) construction has the best performance among other mehtods. We also propose a decomposed bit-plane method for parallel transmission and recovery of 256 gray-scale images using OOSPC's constructed by the BIBD method. The simulation result encourages the feasibility of parallel transmission and recovery of multiuser's images.

  • PDF

EPGA Implementation and Verification of CSIX Module (CSIX 모듈의 FPGA 구현 및 검증)

  • 김형준;손승일;강민구
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.9-17
    • /
    • 2002
  • CSIX-L1 is the Common Switch Interface that defines a physical interface for transferring information between a traffic manager (Network Processor) and a switching fabric in ATM, IP, MPLS, Ethernet and data communication areas. In Tx, data to be transmitted is generated in Cframe which is the base information unit and in Rx, original data is extracted from the received Cframe. CSIX-L1 suppots the 32, 64, 96, and 123-bit interface and generates a variable length CFrame and Idle Cframe. Also CSIX-L1 appends Padding byte and supports 16-bit Vertical parity, CSIX-L1 is designed using Xilinx 4,1i. After functional and timing simulations are completed. CSIX-L1 module is downloaded in Xilinx FPGA XCV1000EHQ240C and verified. The synthesized CSIX module operates at 27MHz.

  • PDF

Simple Signal Detection Algorithm for 4+12+16 APSK in Satellite and Space Communications

  • Lee, Jae-Yoon;Yoon, Dong-Weon;Hyun, Kwang-Min
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.3
    • /
    • pp.221-230
    • /
    • 2010
  • A 4+12+16 amplitude phase shift keying (APSK) modulation outperforms other 32-APSK modulations in a nonlinear additive white Gaussian noise (AWGN) channel because of its intrinsic robustness against AM/AM and AM/PM distortions caused by the nonlinear characteristics of a high-power amplifier. Thus, this modulation scheme has been adopted in the digital video broadcasting-satellite2 European standard. And it has been considered for high rate transmission of telemetry data on deep space communications in consultative committee for space data systems which provides a forum for discussion of common problems in the development and operation of space data systems. In this paper, we present an improved bits-to-symbol mapping scheme with a better bit error rate for a 4+12+16 APSK signal in a nonlinear AWGN channel and propose a simple signal detection algorithm for the 4+12+16 APSK from the presented bit mapping.