• Title/Summary/Keyword: 채널 추적

Search Result 229, Processing Time 0.025 seconds

A study on the effects of digital content marketing in OTT (Over The Top) service platform: focusing on indirect advertising types (OTT(Over The Top) 서비스 플랫폼에서 디지털 콘텐츠마케팅 효과 연구: 간접광고 유형을 중심으로)

  • Kim, Tae-Yang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.155-164
    • /
    • 2020
  • This study measured the effect of PPL(Product Placement: PPL) in OTT(Over The Top) to search a new advertising revenue model according to the change of viewers' video content consumption patterns. On the first, by two research steps, the experiment was carried out using an eye-tracker and then a survey as the second step was administered asking subjects about their attitude about advertising messages, attitude about brand, and intention to purchase the brands used in the experiments. Specifically, the PPL materials used in the experiments were classified with three parts. This study has the meaning as approaching to the PPL research with new methodology by quantitatively access through the eye tracking of the subjects beyond the conventional qualitative measure that depends only on the memory of them. This research aims to find the possibility of indirect advertising as a new revenue model in the OTT environment.

Thin-Walled Beam Model for Structural Analysis of SWATH (SWATH의 구조해석을 위한 Thin-Walled Beam 모델)

  • Sang-Gab Lee;Yoon-Sup Ko
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.4
    • /
    • pp.136-152
    • /
    • 1993
  • This study is intended to develop an accurate and efficient, analytical thin-walled beam model, and to analyze overall behavior of SWATH ship under repeated overloads. SWATH ship is idealized to a simple thin-walled beam of channel type. An analytical beam model is formulated by the stress component with geometrically(fully) nonlinear thin-walled beam and treated numerically by the Finite Element Method. An efficient cyclic plasticity model is also included, suitable for material nonlinear behavior under complex loading conditions. The local stress distribution can be very exactly represented and the material yielding propagation, easily traced. In addition, the local treatment of the effect of shear deformation improves the representation of deformation and shear stress distribution along the section contour. It is desirable to use the analytical thin-walled beam at initial design stage, and is needed to improve the practical thin-walled beam model advancing the current approach.

  • PDF

High Level Design and Performance Evaluation for the Implementation of WCDMA Base Station Modem (WCDMA 기지국 모뎀의 구현을 위한 상위 레벨 설계 및 통합 성능 평가)

  • Do Joo-Hyun;Lee Young-Yong;Chung Sung-Hyun;Choi Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.10-27
    • /
    • 2005
  • In this paper, we propose a high level design architecture of WCDMA(UMTS) base station modem and synchronization algorithms applied to the proposed architecture. Also analysis of each synchronization algorithm and performance evaluation of fixed point designed modem are shown. Since the target system is base station modem, each synchronization algorithm is designed for its stable operation. To minimize implementation complexity, optimum fixed point design for best operation of synchronization algorithms is performed. We performed symbol level link simulation with fixed point designed modem simulator for data rate of 12.2kbps, 64kbps, 144kbps, and 384kbps. We compared performance results to the minimum requirements specified in 3GPP TS 25.104(Release 5). Extensive computer simulation shows that the proposed modem architecture has stable operation and outperform the minimum requirement by 2 dB. The proposed modem architecture has been applied in the implementation of WCDMA reverse link receiver modem chip successfully.

Development of High-Speed Real-Time Signal Processing for 3D Surveillance Radar (3차원 탐색 레이더용 고속 실시간 신호처리기 개발)

  • Bae, Jun-Woo;Kim, Bong-Jae;Choi, Jae-Hung;Jeong, Lae-Hyung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.7
    • /
    • pp.737-747
    • /
    • 2013
  • A 3-D surveillance radar is a pulsed-doppler radar to provide various target information, such as range, doppler and angle by performing TWS. This paper introduces HW/SW architecture of radar signal processing board to process in real-time using high-speed multiple DSP(Digital Signal Processor) based on COTS. Moreover, we introduced a implemented algorithm consisted of clutter map creation/renewal, FIR(Finite Impulse Response) filter for rejection of zero velocity components, doppler filter, hybrid CFAR and finally presented computational burden of each algorithm by performing operational test using a beacon.

Construction of a Radio map for WPS Resistant to Signal Strength Fluctuation (신호 세기 변동에 강인한 WPS용 라디오 맵 구축 기법)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2685-2690
    • /
    • 2014
  • WPS determines position via a two-step process. In the construction phase, a radio map is constituted by collecting radio information signals. Positioning procedure is a step of comparing the radio signal newly acquired with the radio map. If the signals collected and the radio map are different the accuracy decreases. Even though the rate of accuracy is different according to positioning algorithms, accuracy drop is an issue common to all WPS systems. Signal strength fluctuation is caused by the malfunction of the device that receives positioning signals, obstruction and channel interference, etc. In this paper, in order to solve the problem caused by signal strength change, we propose a new radio map construction technique. The proposed method is intended to constitute a strong radio map to changes in the signal strength and updated by collecting the signal strength changes to the radio map. The use of this method is expected to enhance the accuracy of WPS by actively counteracting signal fluctuation.

63Mbps One-to-One Video Transmission Wireless Scheme in a Single-carrier Modulation with 2×2 Multiple Input Multiple Output (2×2 MIMO를 적용한 63Mbps급 단일 반송파 변조 방식의 일대일 영상전송 무선방식)

  • Paik, Junghoon;Kim, Namho;Kim, Young Woo;Hwang, Yongseong
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.1143-1151
    • /
    • 2019
  • In this paper, we propose a wireless transmission scheme that maximizes transmission efficiency per frequency bandwidth in a single carrier modulation scheme. The proposed scheme employs a decision directed channel tracking technique to remove both pilot signal and the guard interval signal between symbols in frames. It performs a raised cosine pulse shaping function with an roll-off factor of 0.05. In addition, 2×2 multiple input and multiple output using two polarized antennas is applied and both equalization and signal separation are performed in the frequency domain. The wireless modem with this technology confirms that the transmission speed of up to 63.3Mbps is achieved under the 5MHz frequency bandwidth

The Phase Estimation Algorithm of Arrival Time Difference in MIMO Underwater Sensor Communication (MIMO 수중 통신에서 도착시간 차이에 따른 보상 알고리즘)

  • Baek, Chang-uk;Jung, Ji-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1531-1538
    • /
    • 2015
  • In this paper, we proposed receiver structure based on an iterative turbo equalization to cope with phase difference between two sensors in MIMO underwater communication channel. In a space-time coded system, it is often assumed that there are no phase errors among the multiple transmitter and receiver chains. In this paper, we have studied the effect of the phase errors between different transmit sensors and different propagation paths in the environment of MIMO underwater communication system, and have shown through BER performance by computer simulations that the bit-error-rate performance can be severely degraded. A decision-directed estimation and compensation algorithm has been proposed to minimize their effects on the system performance. In this paper, we investigate the phase differences and their effects on multiple-input and multiple-output systems, and propose a compensation algorithm for underwater channel model to minimize their effects.

A Design of Parameterized Viterbi Decoder for Multi-standard Applications (다중 표준용 파라미터화된 비터비 복호기 IP 설계)

  • Park, Sang-Deok;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1056-1063
    • /
    • 2008
  • This paper describes an efficient design of a multi-standard Viterbi decoder that supports multiple constraint lengths and code rates. The Viterbi decoder is parameterized for the code rates 1/2, 1/3 and constraint lengths 7,9, thus it has four operation nodes. In order to achieve low hardware complexity and low power, an efficient architecture based on hardware sharing techniques is devised. Also, the optimization of ACCS (Accumulate-Subtract) circuit for the one-point trace-back algorithm reduces its area by about 35% compared to the full parallel ACCS circuit. The parameterized Viterbi decoder core has 79,818 gates and 25,600 bits memory, and the estimated throughput is about 105 Mbps at 70 MHz clock frequency. Also, the simulation results for BER (Bit Error Rate) performance show that the Viterbi decoder has BER of $10^{-4}$ at $E_b/N_o$ of 3.6 dB when it operates with code rate 1/3 and constraints 7.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF