• Title/Summary/Keyword: 제한 메모리

Search Result 564, Processing Time 0.031 seconds

Status of Profiles and Levels for JVT Video Coding Standard (JVT 동영상 국제표준 프로파일/레벨 동향)

  • 김해광;이상윤
    • Broadcasting and Media Magazine
    • /
    • v.7 no.3
    • /
    • pp.12-18
    • /
    • 2002
  • JVT is an international video coding standard that is being developed jointly by VCEG of ITU and MPEG of ISO. The standardization efforts are targeted mainly for a very high compression ratio. JVT is a general video coding technology that may be used in various application fields. JVT began to work seriously on the profiles and levels issues since Geneva meeting, January 2002. Profiles are sub sets of technical tools from the entire tools and levels limit processing power and memory resources of a decoder As of now, three profiles of Baseline, Main and X (not defined name yet) and hierarchically structured levels are defined in JVT FCD. The profiling issue is very important for the JVT s initial objective of Baseline royalty free policy. Royalty free Baseline profiling is currently under practical hurdles and this issue may impact as one of critical factors on the success of JVT standard.

The Construction of Superconcentrator Based on Linear Expander Bounds (선형 팽창기 영역에 기초한 초집중기의 구성)

  • Cho Tae-Kyung;Park Byoung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.179-187
    • /
    • 2005
  • Linear order Concentrators and Superconcentrators have been studied extensively for their ability to interconnect large numbers of devices in parallel, whether in communication systems or in parallel computers. One major limitation on the efficiency of parallel computer designs has been the prohibitively high cost of parallel communication between processors and memories. Linear order concentrators, O(n), can be used to construct theoretically optimal interconnection network schemes. Existing explicitly the defined constructions are based on expanders, which have large constant factors, thereby rendering them impractical lot reasonable sized networks. It demands the construction of concentrator which uses the expander with the smaller expansion constant. This paper introduces an improvement on the method of constructing concentrators using expanders, which reduce the size of resulting concentrator built from any given expander by a constant factor.

  • PDF

Congestion Control Mechanism using Real Time Signaling Information in ATM based MPLS Network (ATM 기반 MPLS 망에서 실시간 신호정보를 이용한 체증 제어 기법)

  • Ahn, Gwi-Im
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.462-469
    • /
    • 2007
  • ATM protocol has the techniques such as cell discarding priority, traffic shaping and traffic policing. ATM based MPLS(Multiprotocol Label Switching) is discussed for its provisioning QoS commitment capabilities, traffic engineering and smooth migration for BcN using conventional ATM infra in Korea. This paper proposes preventive congestion control mechanism for detecting HTR(Hard To Reach) LSP(Label Switched Path) in ATM based MPLS systems. In particular, we decide HTR LSP using real time signaling information(etc., PTI,AIS/RDI) for applying HTR concept in circuit switching to ATM based MPLS systems and use those session gap and percentage based control algorithm that were used in conventional PSTN call controls. We concluded that it maximized the efficiency of network resources by restricting ineffective machine attempts. Proposed control can handle 208% call processing and more than 147% success call, than those without control. It can handle 187% BHCA(Busy Hour Call Attempts) with 100 times less than use of exchange memory.

  • PDF

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network (WSN에서의 효율적 통신을 위한 인증서 폐지 목록 표현 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.553-558
    • /
    • 2007
  • In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys' identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.

A Study on UML based Modeling and Automatic Code Generation for Embedded Software (UML 모델 기반 임베디드 소프트웨어 모델링 및 코드 자동 생성 기법 연구)

  • Ryu, Hodong;Lee, Woo Jin
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.33-40
    • /
    • 2012
  • Recently, embedded environment suffers a huge change, by growth of hardware and turning to be software-controlled. This has improved embedded software complexity. It also brought us the limit of the old development way to resolve the problem. Model-driven development is one solution to solve the limit common software development by previous way, and it became a one uses for embedded environment also. In this paper, we propose model based development approach for embedded software, witch consists of diagram editor and automatic code generator. The diagram editors are implemented by GMF, which include additional functions to solve memory restrictions and concurrent execution problems without OS environment to a automatic code generator. In order to verify the generated code, it will be tested in main control model of UAV by replacing existing module with generated one.

  • PDF

A Design on the Wavelet Transform Digital Filter for an Image Processing (영상처리를 위한 웨이브렛 변환 디지털 필터의 설계)

  • Kim, Yun-Hong;Jeon, Gyeong-Il;Bang, Gi-Cheon;Lee, U-Sun;Park, In-Jeong;Lee, Gang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.3
    • /
    • pp.45-55
    • /
    • 2000
  • In this paper, we proposed the hardware architecture of wavelet transform digital filter for an image processing. Filter bank pyramid algorithm is used for wavelet transform and each fillet is implemented by the FIR filter. For DWT computation, because the memory controller is implemented by hardware, we can efficiently process the multisolution decomposition of the image data only input the parameter. As a result of the image Processing in this paper, 33㏈ PSNR has been obtained on 512$\times$512 B/W image due to 11-bit mantissa processing in FPGA Implementation. And because of using QMF( Quadrature Mirror Filter) properties, it reduces half number of the multiplier needed DWT(Discrete Wavelet Transform) computation so the hardware size is reduced largely. The proposed scheme can increase the efficiency of an image Processing as well as hardware size reduced. The hardware design proposed of DWT fillet bank is synthesized by VHDL coding and then the test board is manufactured, the operating Program and the application Program are implemented using MFC++ and C++ language each other.

  • PDF

A Bitarray-Based Reverse Routing Method in Wireless Sensor Networks (무선 센서 네트워크에서 역방향 통신을 위한 비트열기반 경로설정 방법)

  • Kim, Seon-Hwan;Lee, Myung-Sub;Kim, Chong-Gun;Park, Chang-Hyeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.80-89
    • /
    • 2010
  • Most of the discussed power efficient routing algorithms, such as LEACH, PEDAP and etc., assume that a base station has infinite resources and there is no traffic limit. However, these assumptions cannot be applied to typical wireless sensor network environments, especially a small sensor network using a normal node as the base station. Moreover, many studies on the wireless sensor networks have not been considering the reverse transmission scheme which transmits data from a sink node to the normal nodes. We propose a bitarray-based reverse routing method which is a power efficient routing algorithm for the wireless sensor networks. The proposed method can be easily implemented by using the tree-based routing scheme and can be worked well with the small memory size for the address of sensor nodes. The experimental result shows that the amount of message transmission of the proposed bitarray-based reverse routing method can be reduced about 61.3% or more compared to the previous methods.

Design and Implementation of ECQV Implicit Certificate (ECQV 묵시적 인증서의 설계 및 구현에 관한 연구)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.744-752
    • /
    • 2017
  • ECQV implicit certificate reconstructs the public key from the certificate without validation of the signature unlike the explicit certificate. Like this, the certificate and the public key is implicitly validated when a public key is reconstructed from a certificate. Hence, ECQV implicit certificate is shorter than the explicit certificate due to be only comprised of the public key reconstruction data instead of the signature and the public key, and faster to reconstruct the public key from the certificate than validating the signature. Furthermore, ECQV is well suited for environments and application that resources such as memory and bandwidth are limited because it is shorter the key length, and faster the performance than other cipher cryptography due to be run on ECC. In this paper, we describe prerequisites of ECQV specified in the SECG SEC 4 and issuance of an implicit certificate, reconstruction of the public key from an implicit certificate. Also we designed and implemented ECQV, and measured the performance of it.

Development of Real-time Blood Pressure Monitoring System using Radio Wave (전파를 이용한 실시간 혈압 모니터링 시스템 개발)

  • Jang, Dong-won;Eom, Sun-Yeong;Choe, Jae-Ik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.308-311
    • /
    • 2015
  • Because worldwide interest in the health is increased, the real-time health monitoring system has been demanded to be more convenient non-contact and precise medical devices than conventional. Therefore we developed the blood pressure monitoring system using UWB(Ultra Wide Band) radio wave which contact to the human body through the radar and continuously collect a movement signal of the blood vessel. Then the collected data including pulse rate, systolic blood pressure, diastolic blood pressure is processed in real time. The system monitors and controls through a program-based embedded LCD(Liquid Crystal Display) using Qt GUI(Graphic User Interface) to be displayed in real time. We implement the system as a embedded system because of reducing the size of the limited resources. Existing PC GUI design mode is used relatively large memory, therefore it requires more CPU(Central Processing Unit) capacity and processing time.

  • PDF

FEXT cancellation for high-speed local transmission over twisted pair wiring (동축 선로에서의 초고속 근거리 전송을 위한 FEXT 제거기)

  • 우정수;강규민;임기홍
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.782-791
    • /
    • 2002
  • This paper discusses a far-end crosstalk (FEXT) canceller for twisted-pair transmission. Many twisted-pair systems such as fiber-to-the-curb (FTTC), very high-speed digital subscriber line (VDSL), and high-speed LAN systems, use frequency-division duplexing (FDD) for duplex transmission. It is shown that the maximum reach of FDD twisted-pair system is limited by the performance of its upstream channel, which is located at higher frequencies than the downstream channel. In order to improve the performance of such FDD transceiver, FEXT cancellation is introduced for the channel at higher frequencies. A system arrangement and its blind start-up procedure are studied when the FEXT canceller and equalizer are jointly adapted to combat channel intersymbol interference (ISI), FEXT, and other additive noise. The initial convergence and the steady-state behavior of the proposed twisted-pair system without requiring transmission of an ideal training sequence are investigated. Measured characteristics as well as analytical model of the FEXT channel are used to estimate the time span needed for the FEXT canceller. It is also shown that the memory span for the FEXT canceller is almost independent of the channel, thus making our results useful for the twisted-pair system over all different channels.