• Title/Summary/Keyword: 내장 시스템

Search Result 1,384, Processing Time 0.042 seconds

FPGA Design and SoC Implementation of Constant-Amplitude Multicode Bi-Orthogonal Modulation (정진폭 다중 부호 이진 직교 변복조기의 FPGA 설계 및 SoC 구현)

  • Hong, Dae-Ki;Kim, Yong-Seong;Kim, Sun-Hee;Cho, Jin-Woong;Kang, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11C
    • /
    • pp.1102-1110
    • /
    • 2007
  • In this paper, we design the FPGA (Field-Programmable Gate Array) of the CAMB (Constant-Amplitude Multi-code Biorthogonal) modulation, and implement the SoC (System on Chip). The ASIC (Application Specific Integrated Circuit) chip is be implemented through targeting and board test. This 12Mbps modem SoC includes the ARM (Advanced RISC Machine)7TDMI, 64Kbyte SRAM(Static Random Access Memory) and ADC (Analog to Digital Converter)/DAC (Digital to Analog Converter) for flexible applications. Additionally, the modem SoC can support the variable communication interfaces such as the 16-bits PCMCIA (Personal Computer Memory Card International Association), USB (Universal Serial Bus) 1.1, and 16C550 Compatible UART (Universal Asynchronous Receiver/Transmitter).

A Study on Receiver Sensitivity Measurement using Pilot $E_c/I_o$ Compensation Method at CDMA Communication Network (CDMA 기지국에서 Pilot $E_c/I_o$ 보상기법을 이용한 수신감도 측정에 관한 연구)

  • Jeong, Ki-Hyeok;Ra, Keuk-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.8
    • /
    • pp.9-16
    • /
    • 2007
  • Currently, the measurement of RF parameters for a base station in operation is typically limited to easily measured forward path items. In this paper, the forward monitoring ports of base stations are used to measure the reverse RF performance. The system has been implemented and effectiveness has been proven on an operating base station. The receiver sensitivity is measured using an internal CDMA modem which is used to monitor the output power based on closed loop power control when the modem is connected to the base station via a voice call. In order to improve accuracy, in addition to the modem Tx adjust(TxAdj) parameter, the detector's actual measurement is used. For accurate receiver sensitivity, the measurement should be made when there is no traffic which is not possible on an operating base station. Therefore, pilot channel chip energy to received signal power spectral density ratio$(E_c/I_o)$ compensation method is used to offset the receiver sensitivity degradation with voice traffic increase.

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

Wave Reflections from Breakwaters Having Resonance Channels with Perforated Plates (유공판을 갖는 공진수로 내장형 방파제의 반사특성)

  • Kim, Jeongseok;Seo, Jihye;Lee, Younghoon;Lee, Joongwoo;Park, Woosun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.149-150
    • /
    • 2013
  • Recently, various types of perforated breakwaters are being constructed for protecting offshore storm waves. In general, perforated breakwaters have wave chambers with perforated walls at seaside. Purposes of the wave chambers are to reduce wave reflections and maximum wave forces acting on the breakwater. Impact wave forces due to wave breaking can attack to the perforated wall directly, so the effects have to be considered in the design of the perforated wall carefully. Using resonance channels for wave energy dissipation, a new concept perforated breakwater is proposed, which is free from impact loads. Numerical simulation was made for wave reflection characteristics of the breakwater with respect to major design parameters. Numerical analysis was carried out using the Galerkin's FE model based on the linear potential theory considering energy dissipation on the perforated plate. Variations of wave reflection was investigated according to perforated ratios of perforated plate.

  • PDF

The Study On Monitoring of Power Consumption and Breaking of Abnormal Power using Power Line Commnuncation Modem (전력선통신 모뎀을 이용한 전력소비감시 및 이상전력 차단해 관한 연구)

  • Yoon, Jae-Shik;Wee, Jung-Chul;Lim, Ja-Yong;Kim, Jae-Heon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.279-280
    • /
    • 2009
  • 최근 경세성장과 함께 생활수준의 향상으로 인하여 에너지 수요는 매년 증가하고 있으며 그 중에서 하나인 전력수요도 역시 급격히 늘어나고 있는 추세이다. 이와 더불어 투자자원 및 입지확보의 어려움, 환경제약의 문제로 전력 공급의 어려움은 날로 증가되고 있다. 따라서 수요증가를 전력공급 능력의 증진뿐만 아니라 수요관리 측면에서도 필요성이 대두되고 있다. 전력선 통신은 전력선을 매체로 하기 때문에 신규선로의 포설 없이 가전기기 및 정보화 서비스 모뎀들의 네트워크화에 용이할 뿐만 아니라 커버리지 확장에도 뛰어나서 디지털 가전, 원격검침, 전력설비 감시제어, 국가 재난 감시 시스템 등의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전을 포함한 유비쿼터스 전기설비 네트워크 구성에서 필수적 기술로 채택되고 있기 때문에 지능형 홈 네트워크, 전력IT 부가서비스, 설비감시 네트워크, 유비쿼터스 네트워크 관련 기술에 대한 파급 효과가 매우 크며, 디지털 가전의 기본 통신 방식으로 가장 유력한 기술로써 디지털 가전 구성에서 필수적 기술로 채택되고 있기 때문에 지능형 홈 네트워크 관련 기술에 대한 파급 효과가 매우 크다. 본 연구에서는 전력선통신모뎀을 이용하여 가전기기의 전력 소비를 감지할 수 있는 센서를 내장한 전력선 통신기반의 전력 감시 모듈을 개발하여 실시간 원격 모니터링을 통해 소비전력 패턴을 작성한다. 그리고 전력감시 모듈에 연결된 가전기기의 소비전력 패턴 분석을 통해 전력소비 이상 유무를 감지할 수 있는 알고리즘을 개발, 탑재하여 이상유무를 판단하고 전력소비가 급증할 시 자동으로 전력을 차단하여 화재나 누전의 위험을 방지한다. 이에 본 연구는 전력선통신을 이용하여 전력소비감시 및 이상전력차단에 관한 연구에 관한 것이다.

  • PDF

Protecting E-mail Server with Class-Based Rate Limiting Technique (클래스 기반의 대역 제한 기법을 통한 이메일 서버의 보호)

  • Yim, Kang-Bin;Lee, Chang-Hee;Kim, Jong-Su;Choi, Kyung-Hee;Jung, Gi-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.6 s.324
    • /
    • pp.17-24
    • /
    • 2004
  • This paper proposes an efficient technique to protect e-mail server from DDoS attack using the CBQ (Class Based Queuing) algorithm The proposed method classifies incoming trafic to an e-mail server into three classes: 'more important mail traffic', 'less important traffic' and 'unknown traffic' and assigns bandwidths differently to the traffics. By differentiating the bandwidths of classes, normal mail traffic may flow even under DDoS attack in the proposed technique. The proposed technique is implemented on an embedded system which hires a switching processor with the WFHBD(Weighted Fair Hashed Bandwidth Distribution) engine that has been known as an efficient algorithm to distribute a given bandwidth to multiple sources, and it is verified that it can be an efficient way to protect e-mail server from DDoS attack.

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Logistics network and economic development in China (중국의 물류네트워크 및 경제발전)

  • Li, Kevin;Qi, Guanqiu
    • Journal of Korea Port Economic Association
    • /
    • v.31 no.1
    • /
    • pp.171-188
    • /
    • 2015
  • Logistics network has been increasingly acknowledged as one of the important driving force for economic development in China. With the scope of logistics effect broadening and the development of logistics infrastructure, both logistics network and economy in terms of GDP in China has experienced rapid development hand in hand. This paper investigates the relationship between logistics network and economic growth, using a dataset covering 31 provinces over the period from 2003 to 2012 in China. Factor analysis is applied to obtain a total evaluation of logistics function defining the impact of logistics network on the national economy growth. According to fixed effect panel data approach, a significant and positive impact of logistics network on economic growth in China is found, meanwhile, a comparative analysis regarding economic development between coastal provinces and interior provinces is also conducted. The results suggest that the impact of logistics network on economic growth is higher in eastern provinces than that in western provinces. The policy implication for other nations, in particular for developing nations, is logistics network should be regarded as an important driving force for economic development, and investment should be made in advance to achieve the best efficiency in economic development and planning.

Low Power UHF Tag Chip Design (저 전력 UHF 태그 칩 설계)

  • Kwon, Hyuk-Je;Lee, Pyeong-Han;Lee, Chul-Hee;Kim, Chong-Kyo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.12
    • /
    • pp.47-56
    • /
    • 2008
  • An RFID system comprises a reader and a tag, and this paper focuses on a tag design. A UHF tag is activated by energy supply using electromagnetic waves and energy reflection through impedance mismatching. The tag uses a $0.25{\mu}m$ CMOS process and comprises a digital part executing tag protocols, a 512-bit memory, and an analog part having a rectifier, a modulation/demodulation unit, a clock generator, etc. The total dimension of the tag, including a saw line, is $750{\mu}m*750{\mu}m$ and the power consumption of the tag consumption power is about $17.8{\mu}W$ at a supply voltage of 2V.

Implementation of Korean TTS Service on Android OS (안드로이드 OS 기반 한국어 TTS 서비스의 설계 및 구현)

  • Kim, Tae-Guon;Kim, Bong-Wan;Choi, Dae-Lim;Lee, Yong-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2012
  • Though Android-based smart phones are being released in Korea, Korean TTS engine is not built on them and Google has not announced service or software developer's kit related to Korean TTS officially. Thus, application developers who want to include Korean TTS capability in their application have difficulties. In this paper, we design and implement Android OS-based Korean TTS system and service. For speed, text preprocessing and synthesis libraries are implemented using Android NDK. By using Java's thread mechanism and the AudioTrack class, the response time of TTS is minimized. For the test of implemented service, an application that reads incoming SMS is developed. The test shows that synthesized speech are generated in real-time for random sentences. By using the implemented Korean TTS service, Android application developers can transmit information easily through voice. Korean TTS service proposed and implemented in this paper overcomes shortcomings of the existing restrictive synthesis methods and provides the benefit for application developers and users.