• Title/Summary/Keyword: violation bit

Search Result 15, Processing Time 0.022 seconds

Bit Synchronization Using Violation Bit Detection in 13.56MHz RFID PJM Tag (바이올레이션 비트 검출을 통한 13.56MHz RFID PJM 태그의 비트 동기화 기법)

  • Youn, Jae-Hyuk;Yang, Hoon-Gee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.481-487
    • /
    • 2013
  • To successfully accomplish a bit synchronization, a synchronizer should exploit a preamble pattern. A MFM (modified frequency modulation) flag is uses as a preamble in a PJM (phase jitter modulation) mode RFID standard. In the recent work, a synchronizer for a PJM mode tag was proposed, which is composed of several correlators. In this paper, we present a new bit synchronizer in which a coarse synchronization is done as in the previous work while a fine synchronization is performed via exploiting a violation bit included in the MFM flag. We show that the proposed synchronizer can significantly reduce the overall hardware complexity at the expense of slight burden to a demodulator structure. Through simulation, we also show that its performance is comparable to that of the previous system despite its hardware simplicity.

Support Vector Machines-based classification of video file fragments (서포트 벡터 머신 기반 비디오 조각파일 분류)

  • Kang, Hyun-Suk;Lee, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.652-657
    • /
    • 2015
  • BitTorrent is an innovative protocol related to file-sharing and file-transferring, which allows users to receive pieces of files from multiple sharer on the Internet to make the pieces into complete files. In reality, however, free distribution of illegal or copyright related video data is counted for crime. Difficulty of regulation on the copyright of data on BitTorrent is caused by the fact that data is transferred with the pieces of files instead of the complete file formats. Therefore, the classification process of file formats of the digital contents should take precedence in order to restore digital contents from the pieces of files received from BitTorrent, and to check the violation of copyright. This study has suggested SVM classifier for the classification of digital files, which has the feature vector of histogram differential on the pieces of files. The suggested classifier has evaluated the performance with the division factor by applying the classifier to three different formats of video files.

A Dynamic Transmission Rate Allocation Algorithm for Multiplexing Delay-sensitive VBR-coded Streams (VBR로 부호화된 지연 민감 서비스의 다중화를 위한 동적인 전송률 할당 알고리즘)

  • 김진수;유국열;이문노
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.628-637
    • /
    • 2003
  • This paper describes a novel multiplexing scheme for delay-sensitive multiple VBR-coded bit streams in live multimedia service offered to high-speed networks. The primary goal of multiplexing in this paper is to keep delay limits of each bit streams and to enhance network resource utilization when they no multiplexed and transmitted over network. For this aim, this paper presents a dynamical control scheme which does not cause violation of any delay constraints to each bit steam. The scheme is based on the assumption that recent behavior of the each bit scream has high correlation with near-term future behavior. Such property is used to make as flat as possible by both temporal averaging on a stream-by-stream and spatial averaging is introduced when multiple VBR-coded bit streams are multiplexed. The effectiveness of the scheme is evaluated by several simulation using an MPEG-coded video trace of Star_wars and it is shown that the proposed scheme can effectively reduce the feat rate md coefficient of variation of the multiplexed transmission rate.

Transmission Rate Decision of Live Video Based on Coding Information (부호화 정보에 기반한 라이브 비디오의 전송률 결정)

  • Lee Myeong-jin
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1216-1226
    • /
    • 2005
  • In this paper, a preventive transmission rate decision algorithm, called PTRD, is proposed for the transmission of live video over networks with dynamic bandwidth allocation capability. Frame analyzer predicts the bit-rates of future frames before encoding by analyzing the source information such as spatial variances and the degree of scene changes. By using the predicted bit-rates, transmission rate bounds are derived from the constraints of encoder and decoder buffers. To resolve the problem of renegotiation cost increment due to frequent renegotiations, the PTRD algorithm is presented to decide transmission rates considering the elapsed time after the recent renegotiation and the perceived video quality. From the simulation results, compared to the normalized LMS based method, PTRD is shown to achieve high channel utilization with low renegotiation cost and no delay violation.

  • PDF

Adaptive Usage Parameter Control Mechanism using a Variable Token Pool in ATM Networks (ATM망에서 가변 토큰풀을 이용한 적응적 사용 파라메터 제어 메카니즘)

  • Koo, Ja-Gwang;Lee, Hwan-Chung;Kim, Chong-Gun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2366-2377
    • /
    • 1997
  • An Adaptive Usage Parameter Control(UPC) mechanism using a Variable Token Pool(VTP) which is kind of preventive traffic control in the Asynchronous Transfer Mode(ATM) networks is described. The VTP mechanism can monitor violations of the average bit rate and burst duration as well as peak bit rate for the ON-OFF type traffic. The VTP can vary the token pool size by monitoring burst duration and silence duration for a long term. It also improves the sensitivity against the violation of burst duration and average bit rate and enables to response for the violating traffic situation quickly. The variable token pool size is varied in step size by every burst duration and silence duration. Two important parameters for controlling token pool size are Down_size and Up_size. We compare the performance of LB and JW mechanism with the proposed VTP mechanism by computer simulations. We have known that the proposed method is more effective than the previous mechanisms. It is shown that the cell loss rate of the VTP quite depends on the value of Down_size and Up_size. The two parameters should be decided as a propr value according to traffic situations.

  • PDF

Cell Marking Priority Control Considering User Level Priority in ATM Network (ATM 네트워크에서 사용자 레벨 우선 순위를 고려한 셀 마킹 및 우선 순위 제어)

  • O, Chang-Se;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.4
    • /
    • pp.490-501
    • /
    • 1994
  • In this study the problems of cell marking method used in the field of ATM network traffic control are presented. Also an extended cell marking method considering the user level priority is proposed. The conventional traffic monitoring schemes set the CLP bit of a cell to 1 only under the circumstance of the violation of traffic contract. It causes that the number of low level cells increases and the levels of cells are lowered regardless of the user level priority. The three level priority control method combining FCI bit with CLP bit has also been proposed. It divides CLP=0 cells into two levels. Consequently, the proposed method preserves more cells in high level than the conventional one and the real loss of high level cells can be reduced. The performance of the proposed scheme has also been analyzed by the PBS(partial buffer sharing) with two thresholds for the proposed three levels. The result shows that the PBS with two thresholds can give more efficient control than the scheme with no priority, or the PBS with one threshold.

  • PDF

Interpretation of the Umbrella Clause in Investment Treaties (국제투자조약상 포괄적 보호조항(Umbrella Clauses)의 해석에 관한 연구)

  • Jo, Hee-Moon
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.95-126
    • /
    • 2009
  • One of the controversial issues in investor-state investment arbitration is the interpretation of "umbrella clause" that is found in most BIT and FTAs. This treaty clause requires on Contracting State of treaty to observe all investment obligations entered into with foreign investors from the other Contracting State. This clause did not receive in-depth attention until SGS v. Pakistan and SGS v. Philippines cases produced starkly different conclusions on the relations about treaty-based jurisdiction and contract-based jurisdiction. More recent decisions by other arbitral tribunals continue to show different approaches in their interpretation of umbrella clauses. Following the SGS v. Philippines decision, some recent decisions understand that all contracts are covered by umbrella clause, for example, in Siemens A.G. v. Argentina, LG&E Energy Corp. v. Argentina, Sempra Energy Int'l v. Argentina and Enron Corp. V. Argentina. However, other recent decisions have found a different approach that only certain kinds of public contracts are covered by umbrella clauses, for example, in El Paso Energy Int'l Co. v. Argentina, Pan American Energy LLC v. Argentina and CMS Gas Transmission Co. v. Argentina. With relation to the exhaustion of domestic remedies, most of tribunals have the position that the contractual remedy should not affect the jurisdiction of BIT tribunal. Even some tribunals considered that there is no need to exhaust contract remedies before bringing BIT arbitration, provoking suspicion of the validity of sanctity of contract in front of treaty obligation. The decision of the Annulment Committee In CMS case in 2007 was an extraordinarily surprising one and poured oil on the debate. The Committee composed of the three respected international lawyers, Gilbert Guillaume and Nabil Elaraby, both from the ICJ, and professor James Crawford, the Rapportuer of the International Law Commission on the Draft Articles on the Responsibility of States for Internationally Wrongful Acts, observed that the arbitral tribunal made critical errors of law, however, noting that it has limited power to review and overturn the award. The position of the Committee was a direct attack on ICSID system showing as an internal recognition of ICSID itself that the current system of investor-state arbitration is problematic. States are coming to limit the scope of umbrella clauses. For example, the 2004 U.S. Model BIT detailed definition of the type of contracts for which breach of contract claims may be submitted to arbitration, to increase certainty and predictability. Latin American countries, in particular, Argentina, are feeling collectively victims of these pro-investor interpretations of the ICSID tribunals. In fact, BIT between developed and developing countries are negotiated to protect foreign investment from developing countries. This general characteristic of BIT reflects naturally on the provisions making them extremely protective for foreign investors. Naturally, developing countries seek to interpret restrictively BIT provisions, whereas developed countries try to interpret more expansively. As most of cases arising out of alleged violation of BIT are administered in the ICSID, a forum under the auspices of the World Bank, these Latin American countries have been raising the legitimacy deficit of the ICSID. The Argentine cases have been provoking many legal issues of international law, predicting crisis almost coming in actual investor-state arbitration system. Some Latin American countries, such as Bolivia, Venezuela, Ecuador, Argentina, already showed their dissatisfaction with the ICSID system considering withdrawing from it to minimize the eventual investor-state dispute. Thus the disagreement over umbrella clauses in their interpretation is becoming interpreted as an historical reflection on the continued tension between developing and developed countries on foreign investment. There is an academic and political discussion on the possible return of the Calvo Doctrine in Latin America. The paper will comment on these problems related to the interpretation of umbrella clause. The paper analyses ICSID cases involving principally Latin American countries to identify the critical legal issues arising between developing and developed countries. And the paper discusses alternatives in improving actual investor-State investment arbitration; inter alia, the introduction of an appellate system and treaty interpretation rules.

  • PDF

The Key Issues of Lone Star Investment Treaty Arbitration and the Korean Government Strategy (론스타의 투자조약중재 제기 쟁점과 한국 정부의 전략적 대응방안)

  • Oh, Hyun-Suk;Kim, Sung-Ryong
    • Journal of Arbitration Studies
    • /
    • v.27 no.4
    • /
    • pp.133-156
    • /
    • 2017
  • The purpose of this paper is to take a countermeasure of the investment treaty arbitration that Lone Star claimed to the Korean government. In particular, this study suggests procedural measures to be prepared by the Korean government after the arbitration award. The actual remedy in ICSID arbitration is the annulment procedure of arbitration award. Therefore, this study analyzed the measures that the Korean government can prepare based on the annulment grounds: the inadequacy of the constitution of the arbitral tribunal, the excessive power of the arbitrator, the corruption of the arbitrator, and the serious violation of the rules. First, the Korean government should decide whether to proceed with the annulment procedure after the arbitration award. Second, if they decide to do it, they should review the grounds of annulment. For example, it is possible to analyze whether the relationship between the arbitrator and Lone Star can be properly in the constitution of the arbitral tribunal, whether Lone Star is eligible to apply for ICSID arbitration, or whether arbitration tribunal ignores the crucial evidence that can affect the arbitration award. Independently, the Korean government needs to discuss the investment arbitration appeal system in a long-term perspective.

Third Party's Legal Interest Protection from Commercialization of Drones -A focus on Decision of the German District Court- (카메라 장착 드론에 대한 지상 제3자의 법익 보호 - 독일의 하급심 판결을 중심으로 -)

  • Kim, Sung-Mi
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.1
    • /
    • pp.3-32
    • /
    • 2020
  • With controlling Drones, although it was discussed in the previous study which showed a possibility. Which is personality and property rights of third parties could be violated while operating the drone with a video camera. But It's hard to find out precedents related to drones in Korea. In case of that someone try to control the drone which is equipped with a camera in a yard of neighborhood, the German District Court (Potsdam) considered an operator of drone has little bit of careless to do his duty and admit nonfeasance claim in the owner of the one's property for prevention to repetition of similar situation according to a nonfeasance claim for prevention to Section 1004 (1) sentence 2 of the German Civil Code(BGB). The drone which is equipped with a camera have possibilities to disrupt property and personal rights of the owner. Because a danger in repetition is getting larger regarding the violation of law. Moreover, there is a case that someone shot down the drone which is equipped with a camer. Because it has a risk to interrupt private life and cause some dangerous in our life. The German district court(Riesa) recently have considered that controlling the drone with a camera in private spaces is illegal as a violation of personal life. In addtion to, the action of property owner shot down drone is a legal according to § 228 of the German Civil Code(BGB) which is caleed "Necessity". Although it is difficult to apply to foreign cases directly to Korea, similar cases are likely to be occurred in Korea. The decision of the German District Court showed implications to Korea. As demand for the camera-equipped drone increases in Korea, it is time to discuss specific measures for drone violations.

A Study on the ICSID Arbitration Cases for Fair and Equitable Treatment under International Investment Disputes - Focusing on the Protection of the Investor's Legitimate Expectations - (국제투자분쟁에서 공정·공평 대우에 관한 ICSID 중재사례 연구 - 외국인투자자의 정당한 기대 보호를 중심으로 -)

  • HWANG, Ji-Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.195-216
    • /
    • 2016
  • In determining the content of the FET standard, the tribunals stated protection of investor's legitimate expectations, due process and denial of justice, transparency, discrimination and arbitrariness, good faith, etc. The most major elements of the FET standard is the protection of the investor's legitimate and reasonable expectations. It is necessary to consider whether it is possible to what the expectations of investors are protected as legitimate and it is formed under any circumstances. If host state frustrate investor's legitimate expectations, it found a breach of the FET. The host state's specific assurance may reinforce investor's expectations, but such explicit statement is not always necessary. The host state must preserve a stable environment for investments. However, It must not be understood as the inalterability of the host state's legal framework. It implies that the host state's subsequent changes should be made consistently and predictably. The host state is entitled to exercise a reasonable regulatory authority to respond to changing circumstances in the public purpose. Therefore, whether the violation FET shall be determined through a balanced against the investor's legitimate expectations and the host state's reasonable regulatory exercise in the public interest. And investor should keep in mind that the principle of proportionality is applied unless host state provides stabilization clause or similar commitments to investor. Also host state should establish the basis of an argument about reasonable regulatory authority for public interest.

  • PDF