• Title/Summary/Keyword: Block Error

Search Result 983, Processing Time 0.03 seconds

Performance Evaluation of Scheduling Algorithm for VoIP under Data Traffic in LTE Networks (데이터 트래픽 중심의 LTE망에서 VoIP를 위한 스케줄링 알고리즘 성능 분석)

  • Kim, Sung-Ju;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.20-29
    • /
    • 2014
  • Recently, LTE is preparing to make a new leap forward LTE-A all over the world. As LTE privides high speed service, the role of mobile phones seems to change from voice to data service. According to Cisco, global mobile data traffic will increase nearly 11-fold between 2013 and 2018. Mobile video traffic will reach 75% by 2018 from 66% in 2013 in Korea. However, voice service is still the most important role of mobile phones. Thus, controllability of throughput and low BLER is indispensable for high-quality VoIP service among various type of traffic. Although the maximum AMR-WB, 23.85 Kbps is sufficient to a VoIP call, it is difficult for the LTE which can provide tens to hundreds of MB/s may not keep the certain level VoIP QoS especially in the cell-edge area. This paper proposes a new scheduling algorithm in order to improve VoIP performance after analyzing various scheduling algorithms. The proposal is the technology which applies more priority processing for VoIP than other applications in cell-edge area based on two-tier scheduling algorithm. The simulation result shows the improvement of VoIP performance in the view point of throughput and BLER.

Analysis of Performance of Digital Retrodirective Antenna Technology in High-Speed Rail (고속 철도 환경에서의 디지털 역지향성 안테나 기술 성능 분석)

  • Bok, Junyeong;Lee, Seung Hwan;Shin, Dong Jin;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.11
    • /
    • pp.1264-1271
    • /
    • 2012
  • Fast tracking is important for high-speed data transmission in high-speed mobile environment such as high speed rail and vehicular. Digital retrodirective array antenna is possible to do automatically beam tracking because it can control the phase information of the output signal toward opposite direction to input signal without no a priori knowledge of the arrival direction. Also, Digital retrodirective array antennas has merit that it is easy to upgrade and modify compare with analogue retrodirective array antennas. In this paper, we analyze the BER performance of digital retrodirective array antenna under AWGN environment and multipath signal. Simulation results show correct phase estimation and conjugation of retrodirective array antenna by using phase detector block. Also, phase conjugation technique has better BER performance about 1 dB at source than that of without phase conjugation when phase lag is $15^{\circ}$ in AWGN environment. This paper also discusses effect of the presence of multipath signal. Phase and amplitude error about direction of direct signal occurs when retrodirective array system is affected by interference and multipath signal in the presence of multipath signal.

A Quantization-adaptive Watermarking Algorithm to Protect MPEG Moving Picture Contents (MPEG 동영상 컨텐츠 보호를 위한 양자화-적응적 워터마킹 알고리즘)

  • Kim Joo-Hyuk;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.149-158
    • /
    • 2005
  • This paper proposed a blind watermarking method for video contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm targets MPEG compression system and was designed to control the amount of watermarking to be inserted according to the adaptive quantization scale code to follow the adaptive quantization of the compression system. The inserting positions of the watermark were chosen by considering the frequency property of an image and horizontal, vertical and diagonal property of a $8{\times}8$ image block. Also the amount of watermarking for each watermark bit was decided by considering the quantization step. This algorithm was implemented by C++ and experimented for invisibility and robustness with MPEG-2 system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than $10\%$, which is enough in robustness against the attacks. Therefore, this algorithm is expected to be used effectively as a part in many MPEG systems for real-time watermarking, especially in the sensitive applications to the network environments.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

Simulation Implementation of Fossil Power Plant Condensate Pumps' Rotation Operation Logic Using MATLAB/Simulink (MATLAB/Simulink를 이용한 화력발전소 복수펌프 순환기동로직 시뮬레이션 구현)

  • Yoon, Chang-Sun;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.693-699
    • /
    • 2016
  • The simulators for pump operation developed by domestic or overseas research have been developed for dynamic analysis or operator training purposes. However, previous developed simulators focused on the operators so they are unsuitable for logic designers or commissioning engineers who need to change the operation conditions or logics arbitrarily. In addition, the simulator for two or more condensate pumps' operation, which can be used easily by plant designers or operators, has not been developed. Accordingly, this paper suggests a simulation method that can be used easily for plant designers or operators using MATLAB Simulink. This suggestion helps users who can use MATLAB to implement ANSI/ISA S5.2, which is applied mainly for DCS (Distributed Control System). In addition, to implement the logics specified in the CODE, Sub-Systems were created for the block and evaluated to determine if they can be used in the simulator. In the working level stage using the suggested method, all error possibilities that might occur during the three pumps' rotation operation could be verified with the suggested simulator during the design stage or before operation.

A Blind Watermarking Algorithm using CABAC for H.264/AVC Main Profile (H.264/AVC Main Profile을 위한 CABAC-기반의 블라인드 워터마킹 알고리즘)

  • Seo, Young-Ho;Choi, Hyun-Jun;Lee, Chang-Yeul;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.181-188
    • /
    • 2007
  • This paper proposed a watermark embedding/extracting method using CABAC(Context-based Adaptive Binary Arithmetic Coding) which is the entropy encoder for the main profile of MPEG-4 Part 10 H.264/AVC. This algorithm selects the blocks and the coefficients in a block on the bases of the contexts extracted from the relationship to the adjacent blocks and coefficients. A watermark bit is embedded without any modification of coefficient or with replacing the LSB(Least Significant Bit) of the coefficient with a watermark bit by considering both the absolute value of the selected coefficient and the watermark bit. Therefore, it makes it hard for an attacker to find out the watermarked locations. By selecting a few coefficients near the DC coefficient according to the contexts, this algorithm satisfies the robustness requirement. From the results from experiments with various kinds and various strengths of attacks the maximum error ratio of the extracted watermark was 5.02% in maximum, which makes certain that the proposed algorithm has very high level of robustness. Because it embeds the watermark during the context modeling and binarization process of CABAC, the additional amount of calculation for locating and selecting the coefficients to embed watermark is very small. Consequently, it is highly expected that it is very useful in the application area that the video must be compressed right after acquisition.

Real-time Hand Region Detection based on Cascade using Depth Information (깊이정보를 이용한 케스케이드 방식의 실시간 손 영역 검출)

  • Joo, Sung Il;Weon, Sun Hee;Choi, Hyung Il
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.713-722
    • /
    • 2013
  • This paper proposes a method of using depth information to detect the hand region in real-time based on the cascade method. In order to ensure stable and speedy detection of the hand region even under conditions of lighting changes in the test environment, this study uses only features based on depth information, and proposes a method of detecting the hand region by means of a classifier that uses boosting and cascading methods. First, in order to extract features using only depth information, we calculate the difference between the depth value at the center of the input image and the average of depth value within the segmented block, and to ensure that hand regions of all sizes will be detected, we use the central depth value and the second order linear model to predict the size of the hand region. The cascade method is applied to implement training and recognition by extracting features from the hand region. The classifier proposed in this paper maintains accuracy and enhances speed by composing each stage into a single weak classifier and obtaining the threshold value that satisfies the detection rate while exhibiting the lowest error rate to perform over-fitting training. The trained classifier is used to classify the hand region, and detects the final hand region in the final merger stage. Lastly, to verify performance, we perform quantitative and qualitative comparative analyses with various conventional AdaBoost algorithms to confirm the efficiency of the hand region detection algorithm proposed in this paper.

Crystallographic Studies of Dehydrated $Ag^{+}\;and\;K^{+}$ Exchanged Zeolite A Reacted with Alkali Metal Vapor

  • Yang Kim;Mi Suk Jeong;Karl Seff
    • Bulletin of the Korean Chemical Society
    • /
    • v.14 no.5
    • /
    • pp.603-610
    • /
    • 1993
  • The crystal structure of dehydrated $Ag_{5.6}K_{6.4}-A$, zeolite A ion-exchanged with $K^+\;and\;Ag^+$ as indicated and dehydrated at 360$^{\circ}$C, has been determined by single-crystal X-ray diffraction techniques. Also determined were the structures of the products of the reactions of this zeolite with 0.1 Torr of Cs vapor at 250$^{\circ}$C for 48 h and 72 h, and with 0.1 Torr of Rb vapor at 250$^{\circ}$C for 24 h. The structures were solved and refined in the cubic space group Pm3m at 21(l)$^{\circ}$C (a= 12.255(l) ${\AA}$ , 12.367(l) ${\AA}$, 12.350(l) ${\AA}$, and 12.263(l) ${\AA}$, respectively). Dehydrated $Ag_{5.6}K_{6.4}$-A was refined to the final error indices $R_1= 0.044\;and\;R_2=0.037$ with 202 reflections for which I>3${\sigma}$(I). The crystal structures of the reaction products were refined to $R_1=0.087\;and\;R_2= 0.089$ with 157 reflections, $R_1=0.080\;and\;R_2= 0.087$ with 161 reflections, and $R_1= 0.071\;and\;R_2=0.061$ with 88 reflections, respectively. In the structure of $Ag_{5.6}K_{6.4}-A,\;K^+$ ions block all 8-oxygen rings, and one reduced Ag atom is found per sodalite cavity. Also, ca. 4.6 $Ag^+ ions\;and\;3.4 K^+ ions$ are found at 6-ring sites in the large cavity. The crystal structures of the reaction products show that all $K^+$ and $Ag^+$ ions have been reduced, and that all K^+$ atoms have left the zeolite. Cs or Rb species are found at three different crystallographic sites: 3.0 $Cs^+\;or\;3.0Rb^+$ ions per unit cell occupy 8-ring centers, ca. 8.0 $Cs^+ ions\;or\;5.7 Rb^+$ ions, are found on threefold axes opposite 6-rings deep in the large cavity, and ca. 2.5 $Cs^+\;or\;2.3 Rb^+ ions are found on threefold axes in the sodalite unit. Also, 1 $Rb^+$ ion lies opposite a 4-ring. Silver atoms, corresponding to 75% or 40% occupancy of hexasilver clusters stabilized by coordination to $Cs^+\;or\;Rb^+$ ions, are found at the centers of the large cavities. In the crystal structures of dehydrated Ag_{5.6}K_{6.4}-A$ reacted with Cs vapor, excess Cs atoms are absorbed and these form (locally) cationic clusters such as $(Cs_4)3^+\;and\;(Cs_6)4^+$.

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

Conversion of Camera Lens Distortions between Photogrammetry and Computer Vision (사진측량과 컴퓨터비전 간의 카메라 렌즈왜곡 변환)

  • Hong, Song Pyo;Choi, Han Seung;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.4
    • /
    • pp.267-277
    • /
    • 2019
  • Photogrammetry and computer vision are identical in determining the three-dimensional coordinates of images taken with a camera, but the two fields are not directly compatible with each other due to differences in camera lens distortion modeling methods and camera coordinate systems. In general, data processing of drone images is performed by bundle block adjustments using computer vision-based software, and then the plotting of the image is performed by photogrammetry-based software for mapping. In this case, we are faced with the problem of converting the model of camera lens distortions into the formula used in photogrammetry. Therefore, this study described the differences between the coordinate systems and lens distortion models used in photogrammetry and computer vision, and proposed a methodology for converting them. In order to verify the conversion formula of the camera lens distortion models, first, lens distortions were added to the virtual coordinates without lens distortions by using the computer vision-based lens distortion models. Then, the distortion coefficients were determined using photogrammetry-based lens distortion models, and the lens distortions were removed from the photo coordinates and compared with the virtual coordinates without the original distortions. The results showed that the root mean square distance was good within 0.5 pixels. In addition, epipolar images were generated to determine the accuracy by applying lens distortion coefficients for photogrammetry. The calculated root mean square error of y-parallax was found to be within 0.3 pixels.