• Title/Summary/Keyword: Combination scheme

Search Result 532, Processing Time 0.033 seconds

Adaptive Combination of Intra/Inter Predictions in JM KTA Software (JM KTA 소프트웨어에서 인트라 및 인터 예측블록이 혼합된 코딩 방법)

  • Kim, Min-Jae;Seo, Chan-Won;Jang, Myung-Hun;Han, Jong-Ki
    • Journal of Broadcast Engineering
    • /
    • v.16 no.2
    • /
    • pp.190-206
    • /
    • 2011
  • We propose an adaptive combination scheme of intra and inter prediction modes, where uni-directional intra prediction, bi-directional intra prediction, and inter prediction method are adaptively selected in an EMB (extended macro block). For each EMB, after all inter blocks have been encoded and decoded, the reconstructed blocks are used as reference data for bi-directional intra prediction of other blocks. Whereas conventional intra coding scheme does not use the right and below side pixels of the current block as reference data, the proposed method uses those for bi-directional intra prediction mode. In this paper, we propose three advanced techniques; (a) filter design for bi-directional prediction, (b) adaptive coding order scheme which increases the chance to use the bi-directional intra prediction mode, (c) modification of syntax to represent coding order. The information for the coding order is informed to the decoder by using the modified syntax structure without adding any additional flag. The simulation results show that the proposed scheme reduces the BD-Rate by 0.5%, on average, compared to KTA.

An Efficient Information Fusion Method for Air Surveillance Systems (항공감시시스템을 위한 효율적인 정보융합 기법)

  • Cho, Taehwan;Oh, Semyoung;Lee, Gil-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.3
    • /
    • pp.203-209
    • /
    • 2016
  • Among the various fields in the communications, navigation, and surveillance/air traffic management (CNS/ATM) scheme, the surveillance field, which includes an automatic dependent surveillance - broadcast (ADS-B) system and a multilateration (MLAT) system, is implemented using satellite and digital communications technology. These systems provide better performance than radar, but still incur position error. To reduce the error, we propose an efficient information fusion method called the reweighted convex combination method for ADS-B and MLAT systems. The reweighted convex combination method improves aircraft tracking performance compared to the original convex combination method by readjusting the weights given to these systems. In this paper, we prove that the reweighted convex combination method always provides better performance than the original convex combination method. Performance from the fusion of ADS-B and MLAT improves an average of 51.51% when compared to the original data.

An Untraceable ECC-Based Remote User Authentication Scheme

  • Mehmood, Zahid;Chen, Gongliang;Li, Jianhua;Albeshri, Aiiad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1742-1760
    • /
    • 2017
  • Recent evolution in the open access internet technology demands that the identifying information of a user must be protected. Authentication is a prerequisite to ensure the protection of user identification. To improve Qu et al.'s scheme for remote user authentication, a recent proposal has been published by Huang et al., which presents a key agreement protocol in combination with ECC. It has been claimed that Huang et al. proposal is more robust and provides improved security. However, in the light of our experiment, it has been observed that Huang et al.'s proposal is breakable in case of user impersonation. Moreover, this paper presents an improved scheme to overcome the limitations of Huang et al.'s scheme. Security of the proposed scheme is evaluated using the well-known random oracle model. In comparison with Huang et al.'s protocol, the proposed scheme is lightweight with improved security.

Developing a Faceted Classification Scheme Integrated with a Thesaurus for Literature (시소러스를 연계한 문학류 패싯 분류체계 개발)

  • Park, Zi-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.3
    • /
    • pp.77-89
    • /
    • 2010
  • The purpose of this study is to develop a faceted classification scheme linked with a thesaurus(FCT) to more effectively organize documents according to subject, by transforming the current Korean Decimal Classification system(KDC) into a faceted classification scheme and linking it with Korea’s National Library Subject Headings. This combination should represent complex subjects more clearly, allow users to change citation order, and facilitate the addition of new subjects to the KDC scheme. Furthermore, by linking a thesaurus to the classification scheme, it is possible to share facets and expand the conceptual level of headings through the thesaurus descriptors.

A Cooperative Transmission Scheme Based on Alamouti Coding for Cognitive Radio Networks Over Frequency Selective Fading Channels (주파수 선택적 페이딩 채널에서 안치 무선 통신을 위한 Alamouti 코딩 기반 협력 전송 기법)

  • Kang, Seung-Goo;Kim, Jun-Hwan;Baek, Jee-Hyeon;Yoon, Seok-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6C
    • /
    • pp.403-411
    • /
    • 2011
  • This paper addresses a cooperative transmission scheme based on Alamouti coding for cognitive radio networks over frequency selective fading channels. In the proposed scheme, the Alamouti coded form at the destination node is constructed through a simple combination of symbols at the source node, instead of the time-reversal operation and the conjugate operation at the relay nodes used in the conventional scheme. Numerical results show that the proposed scheme achieves a higher order cooperative diversity than that of the conventional scheme.

A method for purifying reprocessed uranium from even isotopes under conditions of multiple recycle

  • Smirnov, A.Yu.;Palkin, V.A.;Chistov, A.V.;Sulaberidze, G.A.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3650-3659
    • /
    • 2022
  • We proposed a modification of a double cascade scheme to enrich reprocessed uranium. Such a cascade scheme represents a combination of one cascade with "broadening" of the flow and an ordinary three-flow cascade. A calculation and optimization method has been developed for the proposed scheme according to various efficiency criteria. It is shown that the proposed scheme makes it possible to obtain low-enriched uranium of commercial quality using reprocessed uranium of different initial compositions. For example, the enrichment of reprocessed uranium, which had gone through five consequent recycles, was considered. The proposed scheme allowed to enrich it with simultaneous fulfillment of restrictions on isotopes 232U, 234U, and 236U. Such results indicate the scheme's applicability under conditions of multiple recycling of uranium in reactor fuel. Computational experiments have shown that in the proposed modification, a noticeable saving of natural uranium in the cycle (~18%) can be achieved, provided that the additional consumption of separative work does not exceed 10%, compared with the case of enrichment of natural uranium to obtain LEU of equivalent quality.

Real-time Embedded Middleware System using Java-Native Combination Model (자바-네이티브 조합모델을 이용한 실시간 임베디드 미들웨어 시스템에 관한 연구)

  • Kim Kwang-Soo;Jung Min-Soo;Jung Jun-Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.3
    • /
    • pp.141-147
    • /
    • 2005
  • In the field of electrical industry, embedded computing environment including hardware and software is getting more important as the industry shifts to the knowledge-based one. Java could play a great role as bridging technology in such a transition because it provides a lot of benefits like dynamic application download, compatibility of cross platform, and its own security solution. However, the Java technology has a limitation of real-time problem when it is applied to the embedded computing system of the electrical industry. To solve the problem, a novel java-native combination model has been proposed and designed to a firmware level. This scheme has been employed in four kinds of control boards. The result shows that the proposed model has great potential to implement the real-time processing in control of the devices.

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC

  • Zhang, Junsong;Ma, Jian;Li, Xiong;Wang, Wendong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2930-2947
    • /
    • 2014
  • With the rapid growth of the communication technology, intelligent terminals (i.e. PDAs and smartphones) are widely used in many mobile applications. To provide secure communication in mobile environment, in recent years, many user authentication schemes have been proposed. However, most of these authentication schemes suffer from various attacks and cannot provide provable security. In this paper, we propose a novel remote user mutual authentication scheme for multi-server environments using elliptic curve cryptography (ECC). Unlike other ECC-based schemes, the proposed scheme uses ECC in combination with a secure hash function to protect the secure communication among the users, the servers and the registration center (RC). Through this method, the proposed scheme requires less ECC-based operations than the related schemes, and makes it possible to significantly reduce the computational cost. Security and performance analyses demonstrate that the proposed scheme can solve various types of security problems and can meet the requirements of computational complexity for low-power mobile devices.

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

Effects of Spatial Discretization Schemes on Numerical Solutions of Viscoelastic Fluid Flows (공간차분도식이 점탄성 유체유동의 수치해에 미치는 영향)

  • Min, Tae-Gee;Yoo, Jung-Yul;Choi, Hae-Cheon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.9
    • /
    • pp.1227-1238
    • /
    • 2000
  • This study examines the effects of the discretization schemes on numerical solutions of viscoelastic fluid flows. For this purpose, a temporally evolving mixing layer, a two-dimensional vortex pair interacting with a wall, and a turbulent channel flow are selected as the test cases. We adopt a fourth-order compact scheme (COM4) for polymeric stress derivatives in the momentum equations. For convective derivatives in the constitutive equations, the first-order upwind difference scheme (UD) and artificial diffusion scheme (AD), which are commonly used in the literature, show most stable and smooth solutions even for highly extensional flows. However, the stress fields are smeared too much and the flow fields are quite different from those obtained by higher-order upwind difference schemes for the same flow parameters. Among higher-order upwind difference schemes, a third-order compact upwind difference scheme (CUD3) shows most stable and accurate solutions. Therefore, a combination of CUD3 for the convective derivatives in the constitutive equations and COM4 for the polymeric stress derivatives in the momentum equations is recommended to be used for numerical simulation of highly extensional flows.