• Title/Summary/Keyword: Data Transmission Processing

Search Result 901, Processing Time 0.025 seconds

LMS based Iterative Decision Feedback Equalizer for Wireless Packet Data Transmission (무선 패킷데이터 전송을 위한 LMS기반의 반복결정 귀환 등화기)

  • Choi Yun-Seok;Park Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1287-1294
    • /
    • 2006
  • In many current wireless packet data system, the short-burst transmissions are used, and training overhead is very significant for such short burst formats. So, the availability of the short training sequence and the fast converging algorithm is essential in the adaptive equalizer. In this paper, the new equalizer algorithm is proposed to improve the performance of a MTLMS (multiple-training least mean square) based DFE (decision feedback equalizer)using the short training sequence. In the proposed method, the output of the DFE is fed back to the LMS (least mean square) based adaptive DEF loop iteratively and used as an extended training sequence. Instead of the block operation using ML (maximum likelihood) estimator, the low-complexity adaptive LMS operation is used for overall processing. Simulation results show that the perfonnance of the proposed equalizer is improved with a linear computational increase as the iterations parameter in creases and can give the more robustness to the time-varying fading.

A Study on Removing Impulse Noise using Modified Adaptive Switching Median Filter (변형된 적응 스위칭 메디안 필터를 이용한 임펄스 잡음제거에 관한 연구)

  • Gao, Yinyu;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2474-2479
    • /
    • 2011
  • As society has developed rapidly toward a highly advanced digital information age, a multimedia communication service for acquisition, transmission and storage of image data as well as voice has being commercialized. However, image data is always corrupted by various noises during image processing, so researches for removing noises have been continued until now. In this paper, in order to remove impulse noise we proposed modified adaptive switching median filter that consists of two stages: noise detection and noise removal. Proposed algorithm only processes noise pixels and these noise pixels are replaced by filter output, so proposed algorithm performs well not only removes noise but also preserves edge information. Also we compare existing methods using PSNR(peak signal to noise ratio) as the standard of judgement of improvement effect and choose conventional algorithms to compare with our proposed method.

Noise Removal using Modified Switching Filter in Mixed Noise Environments (복합잡음 환경에서 변형된 스위칭 필터를 이용한 잡음 제거)

  • Kwon, Se-Ik;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1215-1220
    • /
    • 2016
  • As society has developed rapidly toward a highly advanced digital information age, a multimedia communication service for acquisition, transmission and storage of image data as well as voice has being commercialized. However, image data is always corrupted by various noises during image processing, so researches for removing noises have been continued until now. There are diverse types of noise on the image including salt and pepper noise, AWGN, and mixed noise. Hence, the filter algorithm for the image recovery was proposed that salt and pepper noise was processed by linear interpolation, histogram weighted values and median filter after defining the noise to lessen the impact of mixed noise added in the image, and AWGN was processed by the pixel information of local mask establishing the weighted values in this study. In addition, the algorithm was compared with the conventional methods for objectively and used the PSNR(peak signal to noise ratio) as the basis of the determination.

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.

Development of the Full color LED displays using the control algorithm of histogram distribution (히스토그램 분포 제어가 가능한 풀칼라 LED 디스플레이장치 개발)

  • Ha, Young-Jae;Jin, Byung-Yun;Kim, Sun-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1708-1714
    • /
    • 2010
  • In this paper, the full color LED billboard or a general quality improvement methods of quality gamma correction, brightness, and brightness adjustment, etc., regardless of the overall color of images uniformly bright or dark have been taken care of. The video itself, but simply expressed as a uniform brightness of a certain size, how to adjust the brightness of input video signal does not reflect the characteristics of the entire screen with just a lighter or darker line is only feeling was brought. So, unlike conventional video transmission system with new LED display technology in the histogram analysis of image data is input by the input image data by determining the luminance values of the attributes are reflected, as appropriate based on the histogram of the distribution of brightness values By controlling the LED display is expressed in the uniform image can improve the brightness control, histogram distribution of the image as full color billboards driven processing technology is proposed.

Design and Development of an XML/EDI System (XML/EDI 시스템의 설계 및 구현)

  • Sin, Dong-Gyu;Sin, Dong-Il
    • The KIPS Transactions:PartD
    • /
    • v.8D no.2
    • /
    • pp.181-192
    • /
    • 2001
  • XML/EDI is different from traditional EDI because it offers the framework necessary for electronic commerce and extends the scope of the traditional EDI which focuses on data transfer. Since existing EDI services are moved to Internet platform and again to Web platform, users can use EDI in the integrated environment without inconvenience of using different EDI softwares, which have their own configurations. This paper describes the overall design and implementation of a Web-based XML/EDI system that is a core component for the electronic commerce. The constructed XML/EDI system in this paper is comprised of document generation module, document storage module, document search module, document management module, template document management module and e-mail transmission module. Requirements and design goal of XML/EDI system are introduced, detailed functionalities of modules and design facts are described and execution and execution procedures of the implemented system are explained.

  • PDF

Mixed Noise Removal using Histogram and Pixel Information of Local Mask (히스토그램 및 국부 마스크의 화소 정보를 이용한 복합잡음 제거)

  • Kwon, Se-Ik;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.647-653
    • /
    • 2016
  • Recently, the data image processing has been applied to a variety of fields including broadcasting, communication, computer graphics, medicine, and so on. Generally, the image data may develop the noise during their transmission. Therefore, the studies have been actively conducted to remove the noise on the image. There are diverse types of noise on the image including salt and pepper noise, AWGN, and mixed noise. Hence, the filter algorithm for the image recovery was proposed that salt and pepper noise was processed by histogram and spatial weighted values after defining the noise to lessen the impact of mixed noise added in the image, and AWGN was processed by the pixel information of local mask establishing the weighted values in this study. Regarding the processed results by applying Lena images which were corrupted by salt and pepper noise(P=50%) and AWGN(${\sigma}=10$), suggested algorithm showed the improvement by 7.06[dB], 10.90[dB], 5.97[dB] respectively compared with the existing CWMF, A-TMF, AWMF.

A FRINGE CHARACTER ANALYSIS OF FRINGE IMAGE (Fringe 영상의 주파수 특성 분석)

  • Seo Young-Ho;Choi Hyun-Jun;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11C
    • /
    • pp.1053-1059
    • /
    • 2005
  • The computer generated hologram (CGH) designs and produces digital information for generating 3-D (3-Dimension) image using computer and software instead of optically-sensed hologram of light interference, and it can synthesis a virtual object which is physically not in existence. Since digital hologram includes an amount of data as can be seen at the process of digitization, it is necessary that the data representing digital hologram is reduced for storing, transmission, and processing. As the efforts that are to handle hologram with a type of digital information have been increased, various methods to compress digital hologram called by fringe pattern are groped. Suitable proposal is encoding of hologram. In this paper, we analyzed the properties of CGH using tools of frequency transform, assuming that a generated CGH is a 2D image by introducing DWT that is known as the better tool than DCT for frequency transform. The compression and reconstruction result which was extracted from the wavelet-based codecs illustrates that it has better properties for reconstruction at the maximum 2 times higher compression rate than the Previous researches of Yoshikawa[2] and Thomas[3].

An Effective Solution to Overcome the Restriction of SACK Blocks' Number in TCP SACK (오프셋을 활용한 효율적인 TCP SACK 메커니즘)

  • Lin, Cui;Hong, Choong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1039-1046
    • /
    • 2005
  • TCP SACK is the unique mechanism to reflect the situation of sink's sequence space, some TCP variants and proposals can perform in conjunction with SACK mechanism for achieving optimal performance. By definition of RFC 2018, however, each contiguous block of data queued at the data receiver is defined in the SACK option by two 32-bit unsigned integers in network byte order. Since TCP Options field has a 40-byte maximum length, when error bursts now, we note that the available option space may not be sufficient to report all blocks present in the receiver's queue and lead to unnecessarily force the TCP sender to retransmit Packets that have actually been received by TCP sink. For overcoming this restriction, in this thesis, a new solution named 'one-byte offset based SACK mechanism' is designed to further improve the performance or TCP SACK and prevent those unwanted retransmissions. The results or both theory analysis and simulation also show that his proposed scheme operates simply and more effectively than the other existing schemes by means of the least bytes and most robust mechanism to the high packet error rates often seen in networks environment.

On the HIDE based Group Signature for Secure Personal Healthcare Record Service (안전한 개인의료정보 서비스를 위한 HIDE 기반의 그룹서명)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2481-2490
    • /
    • 2015
  • The issue of PHR is maintained on the server will be in the hospital. PHR information stored on the server, such as a patient's illness and treatment is very sensitive information. Therefore, patients should be guaranteed the protection of privacy. In addition, the PHR should be allowed to group access of it's approach. Therefore, in this paper the proposed group signature using hierarchical identity-based encryption schemes into can guarantee the PHR data privacy. The session key generated by group signature, it is use a tiered approach. The generated session keys safe PHR data transmission is possible. The proposed method is average 80% than the PKI encryption and ID-based encryption rather than average 50% the algorithm processing is more efficient