• Title/Summary/Keyword: communication networks

Search Result 5,495, Processing Time 0.028 seconds

한국과 캐나다의 정보화 추진정책 비교분석

  • 이홍재
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.240-254
    • /
    • 1999
  • In the knowledge-based society of the new millenium, major countries have implemented computer literacy. Recently the Korean government announced 'CyberKorea21'and established 5 year information & communication technology development plan. In Canada, project CANARIE represents a contribution to building the communications infrastructure of the high-speed communications networks of the 21st century. Countries around the world are looking to Canada as the model for Internet research network(Ca*net3) and 'connecting Canadian'. The purpose of this paper is on the strategic implications through comparative analysis of computer literacy between Canada and Korea.

  • PDF

A Transcoding Algorithm from G.729A to EVRC (G.729A에서 EVRC로의 상호부호화)

  • 곽영진;정지민;권구락;임정석;황인호;이경훈;고성제
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2248-2251
    • /
    • 2003
  • Communication between speech networks employing different speech codecs requires interoperability. The cascade connection of two different codecs, called tandem coding, not only degrades speech quality, but also produces high computational loads. These Problems can be solved by using the transcoding algorithm. This paper presents an effective algorithm for transcoding from G.729A to EVRC and its simulation results.

  • PDF

Technologies for Protection of Information in Public Networks using Communication Satellite (공용 위성 통신망의 정보 보호에 관한 연구)

  • 문희철;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.249-260
    • /
    • 1991
  • 위성 통신망은 도청의 위협이 가장 큰 통신망으로 사용자들의 민감한 정보에 대한 프라이버시의 보호가 어려운 통신망이다. 또한 위성통신의 고유한 특성상 위성체를 원격지에서 제어해야 하므로 위성 제어 신호에 대한 안전한 인증(authentication) 메카니즘이 필요하다. 본 연구에서는 공용 위성 통신망에서 사용자의 프라이버시를 위한 암호시스템과 위성 제어 신호의 안전한 인증 메카니즘을 제시하고자 한다.

  • PDF

AN EXPLICIT FORMULA AND ITS FAST ALGORITHM FOR A CLASS OF SYMMETRIC BALANCED INCOMPLETE BLOCK DESIGNS

  • KANG SUNGKWON;LEE JU-HYUN
    • Journal of applied mathematics & informatics
    • /
    • v.19 no.1_2
    • /
    • pp.105-125
    • /
    • 2005
  • Motivated by the field experimental designs in agriculture, the theory of block designs has been applied to several areas such as statistics, combinatorics, communication networks, distributed systems, cryptography, etc. An explicit formula and its fast computational algorithm for a class of symmetric balanced incomplete block designs are presented. Based on the formula and the careful investigation of the modulus multiplication table, the algorithm is developed. The computational costs of the algorithm is superior to those of the conventional ones.

Past, Present and Future of E-Business

  • Kim Min-Jin;Kim Won-Il;Oh Sang-Yoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.1-4
    • /
    • 2006
  • E-business is not like e-commerce. E-business is more comprehensive than e-commerce. In the near future, it is expected that ebusiness prevails in the fields of wireless, peer-to-peer networks, streaming media and biometrics technologies. In this paper, we discuss the past and current of e-business, and then research topics of e-business, including new technology and the directions.

  • PDF

Diffusion of Broadband Mobile Services in Korea: The Role of Standards and Its Impact on Diffusion of Complex Technology System

  • Yang, Hee-Dong;Yoo, Young-Jin;Kalle-Lyytinen;Ahn, Joong-Ho
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.271-284
    • /
    • 2004
  • Rapid developments in computing and communication technology have made broadband Internet service over the wireless phone networks possible. This so-called 3G (third generation) mobile services promise to usher us into an era of a seamless marriage between Internet data and mobile phone services. However,

  • PDF

Study on Stereoscopic 3D Transmission in Mobile Communication Networks (이동통신 네트워크에서 입체영상 전송 연구)

  • Youn, JooSang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.615-617
    • /
    • 2012
  • 최근 이동통신 인프라 기술은 고용량 전송이 가능한 LTE 이동 통신 시스템이 구축되었다. 따라서 3G 이동통신 시스템에 비해 서비스 용량에 비해 입체영상을 이동통신 시스템에서 실시간으로 전송할 수 있는 고용량의 무선 링크를 확보하였다. 하지만 LTE 이동 통신 시스템도 입체영상을 그대로 전송하기에는 문제점을 가지고 있다. 따라서 본 논문에서는 차세대 이동통신 시스템인 LTE 시스템과 WiFi 네트워크 기반의 고품질의 입체영상을 전송하기 위한 전송 서비스 네트워크 모델을 고찰한다.

  • PDF

Traffic control issues for ATM networks (ATM 망에 대한 트래픽 제어의 문제점 분석)

  • 최영철;조유제;최문기
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.179-182
    • /
    • 1991
  • In this paper, we survey traffic control issues for the B-ISDN based on the ATM. We first investigate traffic descriptors to represent the characteristics of various ATM traffics in a standardized form. Also, we examine key issues related to the connection admission control, usage parameter control, network parameter control, priority control, and congestion control.

A study on the issues related to the quality of service in the B-ISDN (B-ISDN에서의 서비스 품질 관련사항들의 고찰)

  • 고영호;조유제;최문기
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1991.10a
    • /
    • pp.155-158
    • /
    • 1991
  • In this paper, we investigate key issues and the CCITT activities related to the quality of service in the B-ISDN based on the ATM. We first clarify the relationships between the QOS(Quality of Service). NP(Network Performance), and GOS(Grade of Service). Using the GOS, network design and tuning method is suggested. Also, we examine the performance impairments and key NP parameters in ATM networks.

Key Agreement Protocol Using Sylvester Hadamard Matrices

  • Choe, Chang-Hui;Lee, Moon-Ho
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.211-213
    • /
    • 2011
  • In this paper, we propose a key agreement protocol using Sylvester Hadamard matrices. Users obtain their common key by using a matrix shared in advance. Matrix construction is very simple, and the computation is quite fast. The proposal will be useful for communication between two users, especially for those having low computing power.