• Title/Summary/Keyword: Data Transmission Processing

Search Result 901, Processing Time 0.028 seconds

A Study on Modified Average Filter using Standard Deviation of Local Mask in AWGN Environments (AWGN 환경에서 국부 마스크의 표준편차를 이용한 변형된 평균 필터에 관한 연구)

  • Kwon, Se-Ik;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.840-846
    • /
    • 2016
  • Recently, with the rapid demand expansion on the devices of digital image processing, the excellent quality of the images is required. However, the degradation of the images occurs in the processes of data acquisition, processing, and transmission by various external causes and the noise has been well known as the major cause of image degradation. There are a variety of noises to be added on the images, with typical example of AWGN. Hence, in this article, we suggested average filter algorithm processed by the threshold values using them applying standard deviation of local mask under the AWGN environment in this study. As the result of the simulation, The proposed algorithm shows a high PSNR of 24.56[dB] for Barbara images that had been damaged of AWGN(${\sigma}=15$), compared to the existing MF, CWMF and AWMF there were improvements by 3.34[dB], 2.57[dB], and 3.32[dB], respectively.

An Iterative Weighted Mean Filter for Mixed Noise Reduction (복합 잡음 저감을 위한 반복 가중 평균 필터)

  • Lee, Jung-Moon
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.175-182
    • /
    • 2017
  • Noises are usually generated by various external causes and low quality devices in image data acquisition and recording as well as by channel interference in image transmission. Since these noise signals result in the loss of information, subsequent image processing is subject to the corruption of the original image. In general, image processing is performed in the mixed noise environment where common types of noise, known to be Gaussian and impulse, are present. This study proposes an iterative weighted mean filter for reducing mixed type of noise. Impulse noise pixels are first turned off in the input image, then $3{\times}3$ sliding window regions are processed by replacing center pixel with the result of weighted mean mask operation. This filtering processes are iterated until all the impulse noise pixels are replaced. Applied to images corrupted by Gaussian noise with ${\sigma}=10$ and different levels of impulse noise, the proposed filtering method improved the PSNR by up to 12.98 dB, 1.97 dB, 1.97 dB respectively, compared to SAWF, AWMF, MMF when impulse noise desities are less than 60%.

Total Ordering Algorithm over Reliable Multicast Protocol using Token Passing Mechanism (멀티캐스트 프로토콜상에서 토큰 전달 방법을 이용한 전체 순서화 알고리즘)

  • Won, Yu-Jae;Yu, Gwan-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2158-2170
    • /
    • 1999
  • It has been required more reliable communication on processes and improvement of system performance as distributed systems using multicast protocol became widespread. In distributed environment maintaining data consistency through asynchronous execution of processes and coordinating the activities of them would occurs. This paper proposes a total ordering algorithm, TORMP, in order to resolve these problems. TORMP takes advantage of multicast protocol and uses an effective token passing method. It reduces a process delaying time before transmitting its message by multicasting a token simultaneously to every process that initiates the request of the message. Moreover, the processes receiving the token start multicasting the message at the same time, which causes to cut down the overall transmission dely. In case that one process sends a message, TORMP hardly uses the procedure of controlling for ordering. It gives fairly the right of sending messages to all processes in a group with utilizing vector clock. In TORMP, unlike other algorithms, the number of packets generated during ordering process does not depend on the number of processes.

  • PDF

Realization of the Pulse Doppler Radar Signal Processor with an Expandable Feature using the Multi-DSP Based Morocco-2 Board (다중 DSP 구조의 Morocco-2 보드를 이용한 확장성을 갖는 펄스 도플러 레이다 신호처리기 구현)

  • 조명제;임중수
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.7
    • /
    • pp.1147-1156
    • /
    • 2001
  • In this paper, a new design architecture of radar signal processor in real time is proposed. It has been designed and implemented under the consideration to minimize the inter-processor communication overhead and to maintain the coherence in Doppler pulse domain and in range domain. Its structure can be easily reconfigured and reprogrammed in accordance with an addition of function algorithm or a modification of operational scenario. As we designed a task configuration for parallel processing from measures of computation time for function algorithms and transmission time for results by signal processing, data exchange between processors for performing of function algorithms could be fully removed. Morocco-2 board equipped ADSP-21060 processor of Analog Devices inc. and APEX-3.2 developed for SHARC DSP were used to construct the radar signal processor.

  • PDF

A Study on the Estimation of ACSR's Life using Tensile Characteristics (인장특성을 이용한 ACSR 수명예측에 관한 연구)

  • 심재명;김영달;김성덕;강지원
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.13 no.4
    • /
    • pp.120-126
    • /
    • 1999
  • ;The consicErations for reminder life of transmission line is gradually higher. It is requisite for investigation of ACSR's life to test tensile load of ACSR as a fundamental data. It is vary important to analysis correlations between results of tensile load testing and elasped years. Estimation of ACSR's life can be obtained by statistics processing using mechanical experirrental results. It is a general method to use regression analysis as a statistics processing technique. In this paper, we did experiment on tensile strength of ACSR by using a new and old ACSR as sample experirrental materials. The limit of life estimation is decided by basic line using twenty percentage reduction of rate tensile strength. This basic line is like to results of Canada Ontario Hydro-research. There are $95[\textrm{mm}^2]$, $97[\textrm{mm}^2]$, $120[\textrm{mm}^2]$, $240[\textrm{mm}^2]$ ACSRs which are experimented on this study. 1be life estimation of these ACSR is presented by table 1 to be obtained through the linear regression and nonlinear regression analysis. SPSS and statistics toolbox of matlab is used for analysis.lysis.

  • PDF

FPGA Implementation of a Pointer Interpreter for SDH/SONET Network Synchronization (SDH와 SONET망의 동기화를 위한 포인터 해석기의 FPGA 구현)

  • 이상훈;박남천;신위재
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.3
    • /
    • pp.230-235
    • /
    • 2004
  • This paper describes FPGA implementation of a pointer interpreter which can support a synchronization of SDH(or SONET)-based transmission network. The pointer interpreter consists of a pointer-word extractor and a pointer-word interpreter The pointer-word extractor which is composed of mod-6480 counter, shift register and pointer synchronizing block, finds out the H1 and H2 pointer word from a 51.84 Mb/s AU-3/STS-1 data frame and then performs the synchronizing with a 6.48 Mb/s by dividing them in 8. Based on the extracted pointer word, pointer-word interpreter analyzes pointer states such LOP, AIS and NORM according to pointer state-transition algorithm. It consists of a majority vote, a pointer word valid/invalid check, a pointer justification, and a pointer state check. The simulation results of Xilinx Virtex XCV200PQ240 FPGA chip shows the exact pointer word extraction and correct decision of pointer status based on extracted pointer word. The proposed pointer interpreter is suitable for pointer interpretation of 155 Mb/s STM-1/STS-3 frame.

  • PDF

An XML Access Control Method through Filtering XPath Expressions (XPath 표현식의 필터링을 통한 XML 접근 제어 기법)

  • Jeon Jae-myeong;Chung Yon Dohn;Kim Myoung Ho;Lee Yoon Joon
    • Journal of KIISE:Databases
    • /
    • v.32 no.2
    • /
    • pp.193-203
    • /
    • 2005
  • XML (extensible Markup Language) is recognized as a standard of data representation and transmission on Internet. XPath is a standard for specifying parts of XML documents anda suitable language for both query processing and access control of XML. In this paper, we use the XPath expression for representing user queries and access control for XML. And we propose an access control method for XML, where we control accesses to XML documents by filtering query XPath expressions through access control XPath expressions. In the proposed method, we directly search XACT (XML Access Control Tree) for a query XPath expression and extract the access-granted parts. The XACT is our proposedstructure, where the edges are structural summary of XML elements and the nodes contain access-control information. We show the query XPath expressions are successfully filtered through the XACT by our proposed method, and also show the performance improvement by comparing the proposed method with the previous work.

Implementation of Efficient Network Selection System for Mobile IPTV (Mobile IPTV를 위한 효율적 네트워크 선택 시스템 구현)

  • Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.996-1001
    • /
    • 2010
  • In this paper, network selection algorithm for services of mobile IPTV(internet protocol television) and implementation of a hierarchical processing system for reducing overload by terminal with low speed is proposed. This algorithm selects the network according to the following priorities derived from formulas; value that uses remaining bandwidth, network cost, signal strength. If terminal has a low processing power for using selected network and TV service, quality of service declines due to the system overloading. Hence, we implemented system which processes selected network and TV services accomplished by layer divided. Through experiments results, the method of direct user network selection waits for bandwidth assignment. However, on the one hand, that waiting time in exhausted situation will be very long. On the other hand, if we consider the priority plot of used networks, we should select the network with the best state. Therefore, data transmission rate will keep on average and the waiting time will be low.

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

Verification of ERP Standard Time Using TOC Technique and Improvement of MES Routing Point (TOC 기법을 적용한 ERP 표준시간 검증 및 MES 공정실적개선)

  • Kim, Sung-Min;Ahn, Jaekyoung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.22-33
    • /
    • 2018
  • Recently domestic manufacturing companies have been experiencing worsening profitability and stunted growth due to the long-term economic recession and the rapid rise of developing countries such as China and Southeast Asia. These difficulties force many companies to concentrate their core competencies on new value creation and innovation in order to gain momentum for new growth. Enterprise Resource Planning (ERP) has been considered as one of viable solutions. Among the various modules in ERP, shop floor control function in the production management module is rather limited. In order to overcome this problem, Manufacturing Execution System (MES) has been used as a subsystem which has a strong information gathering power and flexibility. Both systems interact closely with each other. In particular, ERP requires fast, accurate shop floor information at MES. This paper describes how to synchronize relevant information between ERP and MES with theory of constraints (TOC). The processing time information transmitted from the MES workplace is received at the ERP workplace. In the process, the received processing time is causing information distortion in ERP, when the information gathering standard of MES is different from the ERP information interpretation standard. The Drum-Buffer-Rope theory of TOC was applied to resolve this problem, therefore, information synchronization between both systems was made. As a precondition, the standard time of the upper ERP system was rearranged according to the capacity constraints resource. As a result, standard time restructuring has affected changes in labor costs. Standard labor costs have come close to actual ones, and information synchronization of MES transmission data has improved the reliability of standard product costs, such that it enabled various company-wide restructuring actions to be much more effective.