• Title/Summary/Keyword: Bit Stream

Search Result 315, Processing Time 0.03 seconds

The Design and Implementation of Method for Providing VCR Functions in VOD (VOD상에서 VOR 기능 제공 방법 설계 및 구현)

  • Hong, Myung-Joon;Park, Ho-Kyun;Ryou, Hwang-Bin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2421-2433
    • /
    • 1997
  • In this paper, based on the relative logical storage cost of each movie by the difference of service request probability, we propose and implement the SDU(Separate Data Use) method and the EDU(Existing Data Use) method to provide FF(Fast Forward) and FR(Fast Reverse) function in efficiently through analysing MPEG bit stream and frame characteristics. By selecting and applying the FF/FR function providing method based on the service request probability of movie, the proposed method can reduce the cost of FF/FR functions for total serviced movies.

  • PDF

Scalable Coding of Depth Images with Synthesis-Guided Edge Detection

  • Zhao, Lijun;Wang, Anhong;Zeng, Bing;Jin, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4108-4125
    • /
    • 2015
  • This paper presents a scalable coding method for depth images by considering the quality of synthesized images in virtual views. First, we design a new edge detection algorithm that is based on calculating the depth difference between two neighboring pixels within the depth map. By choosing different thresholds, this algorithm generates a scalable bit stream that puts larger depth differences in front, followed by smaller depth differences. A scalable scheme is also designed for coding depth pixels through a layered sampling structure. At the receiver side, the full-resolution depth image is reconstructed from the received bits by solving a partial-differential-equation (PDE). Experimental results show that the proposed method improves the rate-distortion performance of synthesized images at virtual views and achieves better visual quality.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

FPGA Implementation of BCH Encoder to change code rate (부호율 변경이 가능한 BCH Ecoder의 FPGA구현)

  • Jegal, Dong;Byon, Kun-sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.485-488
    • /
    • 2009
  • The class of BCH codes is a large class of error correction codes. HDL implementation of BCH code generator to change code rate. and used System Generator, and implemented hardware to FPGA. Loaded bit stream to a FPGA board in order to verify this design to Hardware co-simulation from these results. Also, compared as investigated the maximum action frequency through timing analysis and resource of logic in order to evaluate performance of BCH code generator.

  • PDF

Trends of Low-Precision Processing for AI Processor (NPU 반도체를 위한 저정밀도 데이터 타입 개발 동향)

  • Kim, H.J.;Han, J.H.;Kwon, Y.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.1
    • /
    • pp.53-62
    • /
    • 2022
  • With increasing size of transformer-based neural networks, a light-weight algorithm and efficient AI accelerator has been developed to train these huge networks in practical design time. In this article, we present a survey of state-of-the-art research on the low-precision computational algorithms especially for floating-point formats and their hardware accelerator. We describe the trends by focusing on the work of two leading research groups-IBM and Seoul National University-which have deep knowledge in both AI algorithm and hardware architecture. For the low-precision algorithm, we summarize two efficient floating-point formats (hybrid FP8 and radix-4 FP4) with accuracy-preserving algorithms for training on the main research stream. Moreover, we describe the AI processor architecture supporting the low-bit mixed precision computing unit including the integer engine.

Bit allocation for Broadcasting of scalable video stream over CCN (CCN 에서 효율적인 비디오 스트리밍을 위한 전략)

  • Lee, Jung-Hwan;Ahn, Sung-Won;Yoo, Chuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1027-1028
    • /
    • 2010
  • 현재 인터넷의 구조적 문제점을 해결 하기 위한 미래 인터넷 연구는 컨텐츠 기반의 네트워크를 대상으로 하고 있다. 컨텐츠 중심의 네트워크(CCN)에서는 중계 노드가 컨텐츠 데이터를 저장 하고 있다. 하지만 사용자의 환경에 적합한 컨텐츠를 보내기 위해서는 트랜스코딩 과정이 필요 하다. 우리는 이 과정의 오버헤드를 줄이기 위하여 비디오 컨텐츠를 단계별로 계층화 시킬 수 있는 H.264/SVC 코덱을 사용하여, CCN 의 중계 노드에서 사용자 환경에 맞추어 다른 계층의 비디오 컨텐츠 전송을 가능 하게 하는 기법을 제시한다.

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.

A Study on Test Reliability Improvement of DTV System Test Automation through DTV Bit Stream with Still Image (정지동영상 스트림을 이용한 디지털 TV의 시스템 테스트 자동화 개선 및 시험결과 신뢰성 향상방안연구)

  • Lee, Seung-Kon;Sim, Jae-Hwan;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.363-366
    • /
    • 2008
  • 본 논문에서는 테스트 자동화 도구를 사용하여 디지털 TV의 시스템 테스트 수행 시 테스트 결과의 신뢰성을 향상시키기 위한 방안을 제시하고자 한다. 시스템 테스트 자동화 도구는 디지털 TV의 출력화면을 실시간으로 캡쳐 한 후, 정상 상태의 출력화면과 비교, 분석을 통해 테스트 수행 결과의 성공/실패 판정을 자동으로 수행한다. 본 논문에서는 테스트 도구의 수행 및 수행결과에 대한 판정의 신뢰성을 높이기 위한 방법으로 DTV 화면 출력시에 정지 화면으로 이루어진 동영상이 출력되도록 방송 신호인 비트 스트림을 제작하여, 디지털 TV에 입력하여 테스트하는 방안을 제시한다. 제시된 방안을 통해 기존 방식에서 검출해 내지 못하던 오류를 검출함으로써 테스트 자동화 도구의 수행 성능을 향상시키고, 테스트 결과에 대한 신뢰성을 높이는 방법을 제안한다.

Consideration of Roman Character in KS × 1001 Code System for Information Interchange considered AMI/HDB-3 and HDLC FLAG (AMI/HDB-3 회선부호화 및 HDLC FLAG를 고려한 KS × 1001 정보 교환용 로마문자 부호체계고찰)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1017-1023
    • /
    • 2013
  • Datacommunications transmit the source codes that are coded in information devices, such as computer to the transmission line by means of the line coded signal. AMI method is applied to the line coding method to transmit the signal for long distance. The disadvantage of the AMI method is to loss the bit synchronization when consecutive binary bit '0' over 4ea is coming into line coder. The scrambling technique is used to overcome the problem. The HDB-3 scrambling method is used in Korea standard which standard in ITU-T. When the HDB-3 technology is used. the method should convert the consecutive bit '0' over 4ea to certain bits format. As a result, when there are many such kind of '0' bit stream in source codes, data transmission efficiency will be decreased to treat in line coder, etc. This paper is directed to study the Roman character code system in $KS{\times}1001$, Korea standard for information exchange code in datacommunication systems. Based on the study result, this paper proposed the maximum optimized Roman character code system. In the study, Character coding rule for $4{\times}4$bits and the statistical data for roman character using frequency were considered to simulate. The paper shows the result that when the proposed new roman character coding system is applied to use, the data transmission efficiency could be increased to about 134% compared to existing code system.

An Analysis of Cases of Emulation for Long Term Electronic Records Preservation Strategy (전자기록 장기보존 전략으로서의 에뮬레이션 사례 분석)

  • Kim, Myung-Hun;Oh, Myung-Jin;Lee, Jae-Hong;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.265-309
    • /
    • 2013
  • In response to the current electronic record environment, storing electronic records for necessary long terms have been the topic of the times. Especially, the method to preserving original form such as original functional property and bit stream becomes the key to long term preservation of electronic records. Until now in Korea migration methods were chosen as long term preservation strategy for public records, but the limitations were that the functionality and the original bit stream could not be maintained. Among the strategies for long term preservation of electronic records, emulation has significant strengths in that it can replicate the original form of electronic records without changes in the bit stream, and that unlike migration it can establish a single preservation strategy without needing to apply individual strategies according to type of electronic record. Especially because it can replicate the functional components that cannot be implemented in the current long term preservation format, there is a need to study the application method based on the studies of electronic record types currently used by public institutions. This study, to explore the methods for applying emulation as a strategy for the long term preservation of electronic records, reviews the latest study cases from the west about emulation as base study, and tries to analyze the specific cases about the feasibility, target, and methods of emulation. Through this the study tries to explore the implications for domestic application as well as the strengths and weaknesses of emulation. To do this, the study analyses the concept, strengths and weaknesses of emulation as a long term preservation strategy, the analyses the latest best cases of emulation in the west; CAMiLEON, KB, Planets, and KEEP project. Based on these analysis this study tries to suggest implications and application methods for electronic records in the future in Korea.