• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.029 seconds

An Implementation of Terrestrial DMB PVR using a Fixed Server (고정된 서버를 이용한 지상파 DMB의 PVR 구현)

  • Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.81-86
    • /
    • 2009
  • In this paper, we propose a new algorithm to store streams seamlessly using fixed servers when DMB receivers cannot receive signals properly due to weak signals. This algorithm includes mechanisms for synchronization and playout by retransmitting streams stored in the server. The results showed that signals were normally generated for 95.5% of the delivery failure cases caused by radical changes or turbulence of signals and that the new mechanisms allow AVs played seamlessly even though there were slight stops.

  • PDF

A Study on the Effective WTLS System Implementation using Low-Computation (낮은 계산량을 이용한 효율적인 WTLS 시스템 구현에 관한 연구)

  • 정우열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.138-143
    • /
    • 2003
  • With information communications and network environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the secure communications optimize TLS adapted wireless environment in the TCP/IP internet protocol. But WTLS denote WAP security problem, end-to-end problem, and power consumption, etc. Therefore in this paper we proposed WTLS cryptographic algorithm eliminated WTLS disadvantages. Proposed algorithm solved power consumption, calculated complexity, and security problems because it is not unique but hybrid form.

  • PDF

Implementation of Security Control Protocol for Real-Time Protocol (RTP를 위한 보안 제어 프로토콜 구현)

  • 홍종준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.144-149
    • /
    • 2003
  • Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is needed which is changed with considering network traffic and load. And during many users participate in the same multimedia service, an user who already left the service can receive and the method which decrypt the RTP payload is needed because of knowing the encryption key. Therefore in this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Performance Tradeoff Between Control Period and Delay: Lane Keeping Assist System Case Study

  • Cha, Hyun-Jun;Park, Seong-Woo;Jeong, Woo-Hyuk;Kim, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.39-46
    • /
    • 2015
  • In this paper, we propose a performance-aware workload model for efficient implementation of control systems. When implementing a control algorithm as an embedded computer system, the control code executes periodically. For such systems, its control performance depends on not only the accuracy of the control algorithm itself but also temporal parameters such as control period and sensing to actuation delay. In this regard, this paper studies the relation between control period and delay by measuring and analyzing the control performance of LKAS (Lane Keeping Assist System) with varying period and delay combinations. Through this experimental study, this paper shows that the two timing parameters, i.e.,control period and delay, has a tradeoff relation in terms of control performance.

Design and Implementation of SCPR for Multimedia Information Security (멀티미디어 정보 보안을 위한 SCPR의 설계 및 구현)

  • 홍종준;이재용
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.49-57
    • /
    • 2002
  • Real-Time Protocol (RTP) is used for multimedia information transmission and RTP payload must be encrypted for providing multimedia information security. Encryption/decryption delay is minimized, because there are constraints in transporting a multimedia data through the Internet. Therefore, encryption algorithm is changed with considering network traffic and load. During many users participate in the same multimedia service, an user who already left the service can receive and decrypt the RTP payload because of knowing the encryption key. In this paper, Security Control Protocol for RTP is designed and implemented for changing the encryption algorithm and the key.

  • PDF

Non-Data-Aided Spectral-Line Method for Fine Carrier Frequency Synchronization in OFDM Receivers

  • Roh, Heejin;Cheun, Kyungwhoon
    • Journal of Communications and Networks
    • /
    • v.6 no.2
    • /
    • pp.112-122
    • /
    • 2004
  • A nonlinear spectral-line method utilizing the fourth absolute moment of the receiver discrete Fourier transform output is proposed as a non-data-aided fine carrier frequency synchronization algorithm for OFDM receivers. A simple modification of the algorithm resulting in low implementation complexity is also developed. Analytic expressions are derived for the steady-state frequency error variances of the algorithms and verified to be very accurate via computer simulations over AWGN and frequency selective multipath channels. Numerical results show that the proposed algorithms provide reliable and excellent steady-state performance, especially with PSK modulation. Also, the proposed algorithms are insensitive to symbol timing offsets, only requiring a coarse symbol timing recovery.

Iterative Symbol Decoding of Variable-Length Codes with Convolutional Codes

  • Wu, Hung-Tsai;Wu, Chun-Feng;Chang, Wen-Whei
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.40-49
    • /
    • 2016
  • In this paper, we present a symbol-level iterative source-channel decoding (ISCD) algorithm for reliable transmission of variable-length codes (VLCs). Firstly, an improved source a posteriori probability (APP) decoding approach is proposed for packetized variable-length encoded Markov sources. Also proposed is a recursive implementation based on a three-dimensional joint trellis for symbol decoding of binary convolutional codes. APP channel decoding on this joint trellis is realized by modification of the Bahl-Cocke-Jelinek-Raviv algorithm and adaptation to the non-stationary VLC trellis. Simulation results indicate that the proposed ISCD scheme allows to exchange between its constituent decoders the symbol-level extrinsic information and achieves high robustness against channel noises.

Implementation of Binary Search Algorithm for RFID system and A Study of Performance with RFID system (RFID용 이진 검색 알고리즘의 구현 및 시스템 성능에 관한 연구)

  • Cho, Kyung-Chul;Son, Sung-Chan;Kim, Young-Cheol
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.285-289
    • /
    • 2005
  • In recent years, RFID is widely used in industrial applications including factory, material flow, logistics and defense areas. In this paper, we developed a RFID baseband system with ASK modulation and convolutional channel code. A commercial ASK RF module is used its frequency range in $350{\sim}351$MHz and power is 10mW and the convolution code is constraint length k=3 and rate R=1/2 The performance is measured implemented the binary search algorithm as anti-collision method and we show the wave shapes whit collision occurrence.

  • PDF

The implementation of the Language-Study-Headphone storng to Noise Environment (소음 환경에서 강인한 어학용 헤드폰 구현)

  • Son, Jae-Hyeak;Shin, Jae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.397-405
    • /
    • 2005
  • This paper presents a headphone system which has adopted two algorithm to increase sound clearness and to separate signal from noisy environment. In the field of adaptive signal processing, LMS algorithm which is a kind of steepest decent method, can be implemented with more simple calculation, so that we use it to eliminate unwanted noise elements for the proposed system. Futhermore we generate early echo using some delays, then mix it in signal. This process can increase the clearness of signal. In this paper, we prove that the proposed system can be implemented in real time. The proposed system is satisfied to subject assessment test base on MOS(Mean Opinion Score) of ITU-T.

  • PDF

Design and Implementation of Providing Conditional Access Broadcasting Service System (수신 제한된 방송 서비스 제공 시스템 설계 및 구현)

  • Kim, Dong-Ok;Shin, Ik-Ryong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.64-71
    • /
    • 2009
  • In this paper, This thesis is cell phone for make CAS service be for hand joining broadcasting Create a way CAS Chip. PerSam issue card inside use Seed Key and algorithm make CID Key and record CAS Chip. PerSam member Card inside use Seed Key and algorithm make Subscriber Key after include Subscriber. Key CAS Chip for record CID Key register EMM. make CAS CHIP in accordance with issue CAS Chip. broadcast service entry be for hand treatment so make low bandwidth for joining massage and make increase a member.

  • PDF