• 제목/요약/키워드: digital encoding

검색결과 216건 처리시간 0.027초

Application of Constraint Algorithm for High Speed A/D Converters

  • ;여수아;김만호;김종수
    • 융합신호처리학회논문지
    • /
    • 제9권3호
    • /
    • pp.224-229
    • /
    • 2008
  • In the paper, a new Constraint algorithm is proposed to solve the fan-in problem occurred in the encoding circuitry of an ADC. The Flash ADC architecture uses a Double-Base Number System(DBNS). The DBNS has been known to represent the Multidimensional Logarithmic Number System (MDLNS) used for implementing the multiplier accumulator architecture of FIR filter in Digital Signal Processing (DSP) applications. The authors use the DBNS with the base 2 and 3 in designing ADC encoder circuits, which is called as Double Base Integer Encoder(DBIE). A symmetric map is analyzed first, and then asymmetric map is followed to provide addition ready DBNS for DSP circuitry. The simulation results of the DBIE circuits in 6-bit and 8-bit ADC show the effectiveness of the Constraint algorithm with $0.18{\mu}m$ CMOS technology. The DBIE yields faster processing speed compared to the speed of Fat Tree Encoder (FAT) circuits by 17% at more power consumption by 39%.

  • PDF

인터넷에 기반한 내용기반 검색 시스템 설계 (Content-Based Retrieval System Design over the Internet)

  • 김영호;강대성
    • 제어로봇시스템학회논문지
    • /
    • 제11권5호
    • /
    • pp.471-475
    • /
    • 2005
  • Recently, development of digital technology is occupying a large part of multimedia information like character, voice, image, video, etc. Research about video indexing and retrieval progresses especially in research relative to video. This paper proposes the novel notation in order to retrieve MPEG video in the international standards of moving picture encoding For realizing the retrieval-system, we detect DCT DC coefficient, and then we obtain shot to apply MVC(Mean Value Comparative) notation to image constructed DC coefficient. We choose the key frame for start-frame of a shot, and we have the codebook index generating it using feature of DC image and applying PCA(principal Component Analysis) to the key frame. Also, we realize the retrieval-system through similarity after indexing. We could reduce error detection due to distinguish shot from conventional shot detection algorithm. In the mean time, speed of indexing is faster by PCA due to perform it in the compressed domain, and it has an advantage which is to generate codebook due to use statistical features. Finally, we could realize efficient retrieval-system using MVC and PCA to shot detection and indexing which is important step of retrieval-system, and we using retrieval-system over the internet.

MPEG-2 동영상 표준방식에 대한 채널 오차의 검출 및 은폐 기법 (Channel Error Detwction and Concealment Technqiues for the MPEG-2 Video Standard)

  • 김종원;박종욱;이상욱
    • 한국통신학회논문지
    • /
    • 제21권10호
    • /
    • pp.2563-2578
    • /
    • 1996
  • In this paper, channel error characteristics are investigated to alleviate the channel error propagation problem of the digital TV transmission systems. First, error propagation problems, which are mainly caused by the inter-frame dependancy and variable length coding of the MPEG-2 baseline encoder, are intensively analyzed. Next, existing channel resilient schemes are systematically classified into two kinds of schemes; one for the encoder and the other for the decoder. By comparing the performance and implementation cost, the encoder side schemes, such as error localization, layered coding, error resilience bit stream generation techniques, are described in this paper. Also, in an effort to consider the parcticality of the real transmission situation, an efficient error detection scheme for a decoder system is proposed by employing a priori information of the bit stream syntas, checking the encoding conditions at the encoder stage, and exploiting the statistics of the image itself. Finally, subsequent error concealment technique based on the DCT coefficient recovery algorithm is adopted to evaluate the performance of the proposed error resilience technique. The computer simulation results show that the quality of the received image is significantly improved when the bit error rate is as high as 10$^{-5}$ .

  • PDF

스마트폰을 이용한 Challenge-Response 인증 (Challenge-Response Authentication with a Smartphone)

  • 논 싸이라난;요브네 탄 잉 후이;김태용;이훈재
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2012년도 제46차 하계학술발표논문집 20권2호
    • /
    • pp.187-190
    • /
    • 2012
  • This paper proposes an one-time authentication system for web applications by making use of the quick-response code, which is widely used nowadays. The process is not time-consuming. It does not require any browser extensions or specific hardware to complete a task. The system uses QR code which is basically a two-dimensional black and white image encoding a piece of digital information. When a user logs into a site, the web server will generate a challenge encoded to form a QR code. The user captures a picture of QR code with a mobile camera which results in decoding the QR code. The challenge shall be sent back to the server; the web server then logs the PC browser in. The authentication using Challenge-Response is easy to understand and the process is fast. The system proposes the improvement of usability and security of online authentication.

  • PDF

Self-Encoded Spread Spectrum and Turbo Coding

  • Jang, Won-Mee;Nguyen, Lim;Hempel, Michael
    • Journal of Communications and Networks
    • /
    • 제6권1호
    • /
    • pp.9-18
    • /
    • 2004
  • Self-encoded multiple access (SEMA) is a unique realization of random spread spectrum. As the term implies, the spreading code is obtained from the random digital information source instead of the traditional pseudo noise (PN) code generators. The time-varying random codes can provide additional security in wireless communications. Multi-rate transmissions or multi-level grade of services are also easily implementable in SEMA. In this paper, we analyze the performance of SEMA in additive white Gaussian noise (AWGN) channels and Rayleigh fading channels. Differential encoding eliminates the BER effect of error propagations due to receiver detection errors. The performance of SEMA approaches the random spread spectrum discussed in literature at high signal to noise ratios. For performance improvement, we employ multiuser detection and Turbo coding. We consider a downlink synchronous system such as base station to mobile communication though the analysis can be extended to uplink communications.

광 암호화를 이용한 안전한 지문 인식 시스템 (Secure Fingerprint Identification System based on Optical Encryption)

  • 한종욱;김춘수;박광호;김은수
    • 한국통신학회논문지
    • /
    • 제24권12B호
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

Design and Optimization for Distributed Compress-and-Forward System based on Multi-Relay Network

  • Bao, Junwei;Xu, Dazhuan;Luo, Hao;Zhang, Ruidan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.2949-2963
    • /
    • 2019
  • A novel distributed compress-and-forward (CF) system based on multi-relay network is presented. In this system, as the direct link between the source and destination is invalid due to some reasons, such as the limited power, special working environment, or even economic factors, relays are employed to receive analog signals and carry on distributed compressed encoding. Subsequently, the digital signals are transmitted to the destination via wireless channel. Moreover, a theoretical analysis for the system is provided by utilizing the Chief Executive Officer (CEO) theory and Shannon channel capacity theory, and the rate-distortion function as well as the connection between the transmission rate and the channel capacity are constructed. In addition, an optimal signal-to-noise ratio (SNR) -based power allocation method is proposed to maximize the quantization SNR under the limited total power. Simulation result shows that the proposed CF system outperforms the amplify-and-forward (AF) system versus the SNR performance.

Optical Image Encryption Technique Based on Hybrid-pattern Phase Keys

  • Sun, Wenqing;Wang, Lei;Wang, Jun;Li, Hua;Wu, Quanying
    • Current Optics and Photonics
    • /
    • 제2권6호
    • /
    • pp.540-546
    • /
    • 2018
  • We propose an implementation scheme for an optical encryption system with hybrid-pattern random keys. In the encryption process, a pair of random phase keys composed of a white-noise phase key and a structured phase key are positioned in the input plane and Fourier-spectrum plane respectively. The output image is recoverable by digital reconstruction, using the conjugate of the encryption key in the Fourier-spectrum plane. We discuss the system encryption performance when different combinations of phase-key pairs are used. To measure the effectiveness of the proposed method, we calculate the statistical indicators between original and encrypted images. The results are compared to those generated from a classical double random phase encoding. Computer simulations are presented to show the validity of the method.

VVC 인트라 부호화기술을 이용한 라이트필드 영상 부호화 (Light Field Image Compression using Versatile Video Coding Intra Prediction)

  • ;;이재린;전병우
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송∙미디어공학회 2019년도 하계학술대회
    • /
    • pp.222-224
    • /
    • 2019
  • Light Field (LF) camera captures not only the light intensity but also the light direction coming to camera. While the rich information captured by LF camera enables many interesting applications such as digital refocusing, viewpoint changing, and 3D reconstruction, but it also requires powerful coding tools to reduce its large volume of data. In this paper, we investigate using the intra prediction scheme of the versatile video coding (VVC), which is the most recent video coding technology currently under developing, to compress the LF image. The Intra Block Copy (IBC) technique in VVC is exploited considering special LF image structure. The experimental result shows that VVC intra predict ion outperforms the H.265/HEVC intra coding technique in encoding LF data irrespective of using the IBC mode or not.

  • PDF

트랜스포머 기반 MUM-T 상황인식 기술: 에이전트 상태 예측 (Transformer-Based MUM-T Situation Awareness: Agent Status Prediction)

  • 백재욱;전성우;김광용;이창은
    • 로봇학회논문지
    • /
    • 제18권4호
    • /
    • pp.436-443
    • /
    • 2023
  • With the advancement of robot intelligence, the concept of man and unmanned teaming (MUM-T) has garnered considerable attention in military research. In this paper, we present a transformer-based architecture for predicting the health status of agents, with the help of multi-head attention mechanism to effectively capture the dynamic interaction between friendly and enemy forces. To this end, we first introduce a framework for generating a dataset of battlefield situations. These situations are simulated on a virtual simulator, allowing for a wide range of scenarios without any restrictions on the number of agents, their missions, or their actions. Then, we define the crucial elements for identifying the battlefield, with a specific emphasis on agents' status. The battlefield data is fed into the transformer architecture, with classification headers on top of the transformer encoding layers to categorize health status of agent. We conduct ablation tests to assess the significance of various factors in determining agents' health status in battlefield scenarios. We conduct 3-Fold corss validation and the experimental results demonstrate that our model achieves a prediction accuracy of over 98%. In addition, the performance of our model are compared with that of other models such as convolutional neural network (CNN) and multi layer perceptron (MLP), and the results establish the superiority of our model.