• Title/Summary/Keyword: selection transmission

Search Result 588, Processing Time 0.025 seconds

Compensation Characteristics of Distorted Channels in 200 Gbps WDM Systems using Mid-Span Spectral Inversion Method (200 Gbps WDM 시스템에서 Mid-Span Spectral Inversion 기법을 이용한 채널 왜곡의 보상 특성)

  • 이성렬
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.8
    • /
    • pp.845-854
    • /
    • 2003
  • In this paper, the characteristics of compensation for WDM channel signal distortion due to both chromatic dispersion and Ken effect in 1,000 km 200 Gbps(5${\times}$40 Gbps) WDM systems was investigated. The WDM system has a path-averaged intensity approximation(PAIA) mid-span spectral inversion(MSSI) as a compensation method. This system has a highly nonlinear dispersion shifted fiber(HNL-DSF) optical phase conjugator(OPC) in the mid-way of transmission line. In order to evaluate the degree of compensation, 1 dB eye opening penalty(EOP), bit error rate(BER) characteristics and power penalty of 10$\^$-9/ BER are used. It is confirmed that HNL-DSF is an useful nonlinear medium in OPC fur wideband WDM system with PAIA MSSI and that the optimal compensation for WDM channel distortion is achieved by the selection of pump light power of OPC, which equalize the conjugated light power into the second half fiber section with the input WDM signal light power depending on total transmission length, dispersion coefficient of fiber, OPC pump light wavelength, conversion efficiency of WDM channel in OPC.

Influence of On-line Brand Communities on Customers' Attitudes -Focusing on the Brand Selection of Online Universities- (온라인 브랜드커뮤니티가 소비자 태도에 미치는 영향 -온라인 대학 브랜드 선택을 중심으로-)

  • Rhie, Jinny
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.366-377
    • /
    • 2010
  • As internet and mobile technology brings rapid transformation to this society of information, how relations are conducted between customers have become a critical factor influencing companies. Companies are creating Internet communities based on their brands, encouraging customers to actively form and develop brand communities. Thus, this report proposes a plan to analyze the effectiveness of community activities based on the customers active involvement and how to effectively manage and utilize it. The purpose of this research is to understand the effects on-line brand communities and their characters have on customer behavior. Also, it will study the effects community attitudes have on brand decisions and oral transmission communication when on-line brand communities choose a brand. This report was conducted to survey on-line university students to understand how communities' attitude affects the decision of on-line university brand and oral transmissions when students choose to study at a on-line university. According to research, those factors brought positive responses to character of the brand communities(confidentiality of information, interactivity, convenience, intimacy) and by doing so, on the customer's attitude side, positive results on intention of purchase and oral transmissions can be expected. In addition, the character of the brand communities affects intention of purchase and oral transmission communication. Based on this research, it is possible to propose a marketing strategy that revitalizes brand communities' activities.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

Clustering based Routing Algorithm for Efficient Emergency Messages Transmission in VANET (차량 통신 네트워크에서 효율적인 긴급 메시지 전파를 위한 클러스터링 기반의 라우팅 알고리즘)

  • Kim, Jun-Su;Ryu, Min-Woo;Cha, Si-Ho;Lee, Jong-Eon;Cho, Kuk-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3672-3679
    • /
    • 2012
  • Vehicle Ad hoc Network (VANET) is next-generation network technology to provide various services using V2V (Vehicle-to-Vehicle) and V2I (Vehicle-to-Infrastructure). In VANET, many researchers proposed various studies for the safety of drivers. In particular, using the emergency message to increase the efficiency of traffic safety have been actively studied. In order to efficiently transmit to moving vehicle, to send a quick message to as many nodes is very important via broadcasting belong to communication range of vehicle nodes. However, existing studies have suggested a message for transmission to the communication node through indiscriminate broadcasting and broadcast storm problems, thereby decreasing the overall performance has caused the problem. In addition, theses problems has decreasing performance of overall network in various form of road and high density of vehicle node as urban area. Therefore, this paper proposed Clustering based Routing Algorithm (CBRA) to efficiently transmit emergency message in high density of vehicle as urban area. The CBRA managed moving vehicle via clustering when vehicle transmit emergency messages. In addition, we resolve linkage problem between vehicles according to various form of road. The CBRA resolve link brokage problem according to various form of road as urban using clustering. In addition, we resolve broadcasting storm problem and improving efficacy using selection flooding method. simulation results using ns-2 revealed that the proposed CBRA performs much better than the existing routing protocols.

Review on the Implementation Process and Achievement of ICH Safeguarding System (무형문화재 보호제도의 이행과정과 그 성과에 관한 검토)

  • Lee, Jae Phil
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.4
    • /
    • pp.18-41
    • /
    • 2011
  • The Safeguarding of Intangible Cultural Heritage in Korea has begun since1962 when the Cultural Properties Protection Act was established. Korean ICH Safeguarding system is initially derived from Cultural Properties Protection Act in Japan. Japan has started Important ICH Designation System in 1954 to concede the skills and artistic talents holders, thus it could implement the multilateral system management for adopting different ICH protection systems such as Important Intangible Folklore Properties, Selection and Preservation Techniques, and Documenting Records. However, Korea has solely adopted Important ICH Designation System since Cultural Properties Protection Act was introduced. Korean ICH Safeguarding System represented by the Certification System of ICH Skill Holders is to ensure skills and artistic holders who perform the elements of Intangible Cultural Heritage, and manage the safeguarding of intangible cultural heritage in order to let the skills and artistic holders instruct inheritors. As a result, it could build up the internal foundation for the diffusion of inheritors and established the related organizations. However, the inheritor-centered protection system has caused many problems as it is being lasted for more than fifty years. Fragmented designation measures, the cultural power of skill holders, and the research and evaluation methods have pointed out the difficulties of safeguarding and preservation measures of ICH. Moreover,the legitimacy of safeguarding system related in the authenticity of transmission in ICH has emerged to review the safeguarding system of ICH with diverse viewpoints. Therefore, this paper will review the implementation process and achievement of ICH safeguarding system to examine the problem and causes of the safeguarding system. The conference records of Cultural Property Association and articles of cultural properties policies directors, Cultural Property Association members, and professional experts are being used for the initial materials of this paper, and it is examined for the contents of designation system of Important Cultural Heritage, rather than overall cases. Thus such problems the limitation of expansion in ICH lists as inheritor-centered designation system, hierarchical and exclusive transmission system, inappropriate concept of archetype as the principle of ICH transmission are derived from the root of Important ICH designation system. Thus this paper demonstrates that this system must be revised for the expansion of ICH safeguarding system in Korea and points out multilateral protection system should be established as well as Certification System of Important ICH skill holders.

A Study on the ISDN Telephone User-Network Interface Part2: A Study on the ISDN User Terminal; Digital Telephone (ISDN용 전화가입자 - 망 간 접속에 관한 연구 제 2 부 : ISDN용 가입자 단말장치-Digital Telethone-에 관한 연구)

  • 옥승수;김선형;김영철;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.1
    • /
    • pp.71-81
    • /
    • 1987
  • To fuly utilize the availability of the ISDN, it is very important to develop the ISDN user terminals which can provide various user services. In this paper, the basic concept of the ISDN user terminal is briefly studied and, based on this study, a stimulus type digital telephone which can be connected directly to the ISDN is designed. This digital telephone can provide the basic voice service and has general functions such as voice encoding / decoding(PCM is used), user-network signalling, digital tone supply, channel selection, key pad and atatus display. Echo cancellation method is adopted for the digital subscirber loop transmission and user-network signalling is implemented according to the LAPD(Link Access Procedure on D-channel) protocol recommended by the CCITT's recommendations I.440-I.441. The validity of designed S/W and H/W functions are verified by testing them with ISDN circuit switching emulator described in the first part of this paper.

  • PDF

Recent Progress in Biotechnology-based Gene Manipulating Systems to Produce Knock-In/Out Mouse Models

  • Lee, Woon Kyu;Park, Joong Jean;Cha, Seok Ho;Yun, Cheol-Heui
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.21 no.5
    • /
    • pp.745-753
    • /
    • 2008
  • Gene-manipulated mice were discovered for the first time about a quarter century ago. Since then, numerous sophisticated technologies have been developed and applied to answer key questions about the fundamental roles of the genes of interest. Functional genomics can be characterized into gain-of-function and loss-of-function, which are called transgenic and knock-out studies, respectively. To make transgenic mice, the most widely used technique is the microinjection of transgene-containing vectors into the embryonic pronucleus. However, there are critical drawbacks: namely position effects, integration of unknown copies of a foreign gene, and instability of the foreign DNA within the host genome. To overcome these problems, the ROSA26 locus was used for the knock-in site of a transgene. Usage of this locus is discussed for the gain of function study as well as for several brilliant approaches such as conditional/inducible transgenic system, reproducible/inducible knockdown system, specific cell ablation by Cre-mediated expression of DTA, Cre-ERTM mice as a useful tool for temporal gene regulation, MORE mice as a germ line delete and site specific recombinase system. Techniques to make null mutant mice include complicated steps: vector design and construction, colony selection of embryonic stem (ES) cells, production of chimera mice, confirmation of germ line transmission, and so forth. It is tedious and labor intensive work and difficult to approach. Thus, it is not readily accessible by most researchers. In order to overcome such limitations, technical breakthroughs such as reporter knock-in and gene knock-out system, production of homozygous mutant ES cells from a single targeting vector, and production of mutant mice from tetraploid embryos are developed. With these upcoming progresses, it is important to consider how we could develop these systems further and expand to other animal models such as pigs and monkeys that have more physiological similarities to humans.

Improving Transmission Performance of Real Time Traffic in HMIPv6 (HMIPv6에서 실시간 트래픽의 전송 성능 향상 방안)

  • Park, Won-Gil;Kim, Byung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.960-968
    • /
    • 2006
  • HMIPv6 improved the handover management of basic MIPv6 by introducing the new protocol agent MAP. In this new protocol, MAP instead of the Mobile Node intercepts all packets and redirects the packets to CoA of the Mobile Node. However, this process may degrade the network performance due to the centralization phenomenon of registration occurring in the hierarchical MAP structure. ffe propose two schemes to improve real time traffic performance. First proposal is a MAP selection mettled in which MAP is selected based on traffic characteristics. And we also propose differentiated traffic processing scheme with multi-level queues when Home Agent or Correspondent Nodes process Binding Update messages. Performances of the proposed scheme are analyzed. Analysis result shows that our model has good performance in the respect of location update cost and total cost of Mobile Nodes.

QoS Enhancement Based on Link Quality in Tactical Data Link of KVMF (KVMF 전술네트워크에서 링크 품질에 기반한 QoS 향상 방안)

  • Kwon, Koo-Hyung;Jeong, Hyun-Sook;Lim, Won-Gi;Yoon, Young-Deuk;Kim, Sang-Soo;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.139-150
    • /
    • 2014
  • This paper suggests an algorithm to improve QoS by using DTR bit employed in the MIL-STD-188-220 protocol, when there is a multi-path between source and destination in the environment of KVMF tactical network supporting NCW. The MIL-STD-188-220 protocol can evaluate the link quality relatively but it cannot support optimal path selection for QoS. In order to solve this problem, we design an algorithm for selecting path using topology table which reflects measured DTR of path after the completion of transmission. The performance of the proposed algorithm has been evaluated by OPNET simulator. As a result of the simulation, it is found that QoS of proposed algorithm is enhanced higher than that of the MIL-STD-188-220 in the aggravated communication environment.

Characterization of Insertional Variation of Porcine Endogenous Retroviruses in Six Different Pig Breeds

  • Jung, W.Y.;Yu, S.L.;Seo, D.W.;Jung, K.C.;Cho, I.C.;Lim, H.T.;Jin, D.I.;Lee, Jun-Heon
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.10
    • /
    • pp.1357-1363
    • /
    • 2012
  • Pigs may need to be exploited as xenotransplantation donors due to the shortage of human organs, tissues and cells. Porcine endogenous retroviruses (PERVs) are a significant obstacle to xenotransplantation because they can infect human cells in vitro and have the potential for transmission of unexpected pathogens to humans. In this research, 101 pigs, including four commercial breeds (23 Berkshire, 13 Duroc, 22 Landrace and 14 Yorkshire pigs), one native breed (19 Korean native pigs) and one miniature breed (10 NIH miniature pigs) were used to investigate insertional variations for 11 PERV loci (three PERV-A, six PERV-B and two PERV-C). Over 60% of the pigs harbored one PERV-A (907F8) integration and five PERV-B (B3-3G, B3-7G, 742H1, 1155D9 and 465D1) integrations. However, two PERV-A loci (A1-6C and 1347C1) and one PERV-B locus (B3-7F) were absent in Duroc pigs. Moreover, two PERV-C loci (C2-6C and C4-2G) only existed in Korean native pigs and NIH miniature pigs. The results suggest that PERV insertional variations differ among pig breeds as well as among individuals within a breed. Also, the results presented here can be used for the selection of animals that do not have specific PERV integration for xenotransplantation research.