• Title/Summary/Keyword: Dual media

Search Result 190, Processing Time 0.022 seconds

Application of Biosignal Data Compression for u-Health Sensor Network System (u-헬스 센서 네트워크 시스템의 생체신호 압축 처리)

  • Lee, Yong-Gyu;Park, Ji-Ho;Yoon, Gil-Won
    • Journal of Sensor Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.352-358
    • /
    • 2012
  • A sensor network system can be an efficient tool for healthcare telemetry for multiple users due to its power efficiency. One drawback is its limited data size. This paper proposed a real-time application of data compression/decompression method in u-Health monitoring system in order to improve the network efficiency. Our high priority was given to maintain a high quality of signal reconstruction since it is important to receive undistorted waveform. Our method consisted of down sampling coding and differential Huffman coding. Down sampling was applied based on the Nyquist-Shannon sampling theorem and signal amplitude was taken into account to increase compression rate in the differential Huffman coding. Our method was successfully tested in a ZigBee and WLAN dual network. Electrocardiogram (ECG) had an average compression ratio of 3.99 : 1 with 0.24% percentage root mean square difference (PRD). Photoplethysmogram (PPG) showed an average CR of 37.99 : 1 with 0.16% PRD. Our method produced an outstanding PRD compared to other previous reports.

Adaptive block tree structure for video coding

  • Baek, Aram;Gwon, Daehyeok;Son, Sohee;Lee, Jinho;Kang, Jung-Won;Kim, Hui Yong;Choi, Haechul
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.313-323
    • /
    • 2021
  • The Joint Video Exploration Team (JVET) has studied future video coding (FVC) technologies with a potential compression capacity that significantly exceeds that of the high-efficiency video coding (HEVC) standard. The joint exploration test model (JEM), a common platform for the exploration of FVC technologies in the JVET, employs quadtree plus binary tree block partitioning, which enhances the flexibility of coding unit partitioning. Despite significant improvement in coding efficiency for chrominance achieved by separating luminance and chrominance tree structures in I slices, this approach has intrinsic drawbacks that result in the redundancy of block partitioning data. In this paper, an adaptive tree structure correlating luminance and chrominance of single and dual trees is presented. Our proposed method resulted in an average reduction of -0.24% in the Y Bjontegaard Delta rate relative to the intracoding of JEM 6.0 common test conditions.

A Deep Learning Model for Extracting Consumer Sentiments using Recurrent Neural Network Techniques

  • Ranjan, Roop;Daniel, AK
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.238-246
    • /
    • 2021
  • The rapid rise of the Internet and social media has resulted in a large number of text-based reviews being placed on sites such as social media. In the age of social media, utilizing machine learning technologies to analyze the emotional context of comments aids in the understanding of QoS for any product or service. The classification and analysis of user reviews aids in the improvement of QoS. (Quality of Services). Machine Learning algorithms have evolved into a powerful tool for analyzing user sentiment. Unlike traditional categorization models, which are based on a set of rules. In sentiment categorization, Bidirectional Long Short-Term Memory (BiLSTM) has shown significant results, and Convolution Neural Network (CNN) has shown promising results. Using convolutions and pooling layers, CNN can successfully extract local information. BiLSTM uses dual LSTM orientations to increase the amount of background knowledge available to deep learning models. The suggested hybrid model combines the benefits of these two deep learning-based algorithms. The data source for analysis and classification was user reviews of Indian Railway Services on Twitter. The suggested hybrid model uses the Keras Embedding technique as an input source. The suggested model takes in data and generates lower-dimensional characteristics that result in a categorization result. The suggested hybrid model's performance was compared using Keras and Word2Vec, and the proposed model showed a significant improvement in response with an accuracy of 95.19 percent.

Prediction of residual chlorine using two-component second-order decay model in water distribution network (이변량 감소모델을 적용한 배급수관망에서의 잔류염소농도 예측 및 이의 활용)

  • Kim, Young Hyo;Kweon, Ji Hyang;Kim, Doo Il
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.3
    • /
    • pp.287-297
    • /
    • 2014
  • It is important to predict chlorine decay with different water purification processes and distribution pipeline materials, especially because chlorine decay is in direct relationship with the stability of water quality. The degree of chlorine decay may affect the water quality at the end of the pipeline: it may produce disinfection by-products or cause unpleasant odor and taste. Sand filtrate and dual media filtrate were used as influents in this study, and cast iron (CI), polyvinyl chloride (PVC), and stainless steel (SS) were used as pipeline materials. The results were analyzed via chlorine decay models by comparing the experimental and model parameters. The models were then used to estimate rechlorination time and chlorine decay time. The results indicated that water quality (e.g. organic matter and alkalinity) and pipeline materials were important factors influencing bulk decay and sand filtrate exhibited greater chlorine decay than dual media filtrate. The two-component second-order model was more applicable than the first decay model, and it enabled the estimation of chlorine decay time. These results are expected to provide the basis for modeling chlorine decay of different water purification processes and pipeline materials.

Limitations of the Transition State Variation Model. Part 8. Dual Reaction Channels for Solvolyses of 3,4-Dimethoxybenzenesulfonyl Chloride

  • Koo, In-Sun;Kwon, Eun-Ju;Choi, Ho-June;Yang, Ki-Yull;Park, Jong-Keun;Lee, Jong-Pal;Lee, Ikc-Hoon;Bentley, T. William
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.12
    • /
    • pp.2377-2381
    • /
    • 2007
  • Solvolyses of 3,4-dimethoxybenzenesulfonyl chloride (DSC) in water, D2O, CH3OD, and in aqueous binary mixtures of acetone, acetonitrile, 1,4-dioxane, ethanol, methanol, and 2,2,2-trifluoroethanol (TFE) have been investigated at 25.0 oC. Kinetic solvent isotope effects (KSIE) in water and in methanol and product selectivities in alcohol-water mixtures are also reported. The Grunwald-Winstein plot of first-order rate constants for the solvolyic reaction of DSC with YCl shows marked dispersions into separated lines for various aqueous mixtures. With use of the extended Grunwald-Winstein equation, the l and m values obtained are 1.12 and 0.58 respectively for the solvolyses of DSC. The relatively large magnitude of l is consistent with substantial nucleophilic solvent assistance. From Grunwald-Winstein plots the rate data are dissected approximately into contributions from two competing reaction channels. This interpretation is supported for alcohol-water mixtures by the trends of product selectivities, which show a maximum for ethanol-water mixtures. From the KSIE of 1.45 in methanol, it is proposed that the reaction channel favored in methanolwater mixtures and in all less polar media is general-base catalysed and/or is possibly (but less likely) an addition-elimination pathway. Also, the KISE value of 1.35 for DSC in water is expected for SN2-SN1 processes, with minimal general base catalysis, and this mechanism is proposed for solvolyses in the most polar media.

Anomie Social Environment and Juvenile Delinquency (아노미(Anomie)적 사회환경과 청소년 범죄: 소셜 미디어를 중심으로)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.37-44
    • /
    • 2015
  • There appears a variety forms of crime type and age in accordance with the change of social structure. In this paper it is described for combining the Anomie theory of Emile Durkheim. Anomie refers to the absence of dual standards or norms. In other words, while weakening the existing norms prevailing when the new rules has not been established. That situation would cause social chaos. Rules on the dissemination and utilization of SNS due to the development of information and communication technology undermine the social norms while online regulations are being a weak state not established. In the confusion of these norms it has been shown to increase in juvenile delinquency. Social media has characteristics such as openness, accessibility, relationships, and content diversity. The social media itself is not subject to the general mechanisms of consumption and production due to growing as a kind of organism. It has characteristic to make the most content by utilizing the users to voluntarily share information. Social media using as communication, contact and information in the youth, thus the possibility of crime is high. Social media is also direct and indirect influence on youth crime but no apparent systemic regulation of this situation.

Performance Analysis of Amplify-and-Forward Relaying in Cooperative Networks with Partial Relay Selection (부분 중계노드 선택 기반의 협력 네트워크에서 증폭 후 전송 방식에 대한 성능분석)

  • Hwang, Ho-seon;Ahn, Kyung-seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2317-2323
    • /
    • 2015
  • In this paper, we analyze the performance of dual-hop amplify-and-forward (AF) relaying in cooperative networks with partial relay selection. An AF relay gain considered in this paper includes channel-noise-assisted relay gain. Leveraging a received signal-to-noise ratio (SNR) model, we derive exact closed-form expressions for the probability density function (pdf) and cumulative distribution function (cdf) of the end-to-end SNR. Moreover, an exact closed-form expression of the ergodic capacity for dual-hop AF relaying with channel-noise-assisted relay gain and partial relay selection is investigated. The analytical results shown in this paper are confirmed by Monte-Carlo simulations.

Power Controlled Dual-channel UC Protocol for Mobile Ad Hoc Networks (Ad hoc 네트워크에서 전력 제어 기법을 사용한 Dual-Channel MAC 프로토콜)

  • Kang, Chang-Nam;Han, Do-Hyung;Lee, Eun-Ju;Jaw, Jeong-Woo;Lim, Jea-Yun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.101-104
    • /
    • 2007
  • Ad hoc 네트워크는 기반구조가 없는 무선네트워크이다. Ad hoc 네트워크는 재난지역, 군사지역, 홈 네트워킹 서비스, 텔레매틱스 서비스 같은 곳에서 응용될 수 있다. 최근Ad hoc 네트워크의 처리량을 향상시키기 위해 방향성 안테나를 사용하거나 이중채널을 사용하는MAC프로토콜이 제안되고 있다. DUBMAC프로토콜은 이중채널에 방향성 안테나를 사용하여 처리량 성능을 향상시킨 프로토콜이다. 본 논문에서는 DUDMAC프로토콜에 전력 제어 기법을 적용하여 네트워크의 처리량을 향상시키는 MAC 프로토콜을 제안한다. 제안하는 MAC 프로토콜은 새로운 블로킹 알고리즘을 사용하여 공간 재사용을 향상시킨다. 제안하는 블로킹 알고리즘은 RTS 또는 CTS 수신 시 블로킹 테이블에 저장된 수신세기를 사용하여 기존의 DUDMAC의 블로킹 영역을 FULL_BLOCKING 영역과 SEMI_BLOCKING 영역으로 구분하여 성능을 개선한다. 제안하는 MAC 프로토콜의 처리량 성능은 퀄넷 시뮬레이터 버전 3.8을 사용하여 확인하였다.

  • PDF

Development of Embedded Security Fax Server Supporting Dual Mode (이중 방법을 지원하는 임베디드 보안 팩스 서버 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.129-138
    • /
    • 2004
  • Even though the Internet applications such as e-mail and FTP are widely used, fax is still an important media for data communications till today. Many researches on security over the Internet data communication have been done over the years, on the other hand not many researches have been dedicated to the fax security issue which is as important as the Internet. In this paper, we describe the development of hardware and software of the embedded security fax server which increases the security in supporting existing fax. The developed system is designed and implemented to maintain security while minimizing the delay due to encryptionㆍdecryption. Since there's international or domestic tryptographic standard and each nation have their policy to restrict the use of cryptographic system, we adopt domestic standard cryptographic protocol admitted in Korea. And the system supports two modes: Security mode and Non-Security mode that user can choose from. The system can be applied directly which is the requirements of users at company ,End the government. We verify the performance and functioning of the system in various real environment.

Design and Analysis of MPEG-2 MP@HL Decoder in Multi-Processor Environments

  • Yoo, Seung-Hwan;Lee, Hyun-Seung;Lee, Sang-Jo;Park, Rae-Hong;Kim, Do-Hyung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.211-216
    • /
    • 2009
  • As demands for high-definition television (HDTV) increase, the implementation of real-time decoding of high-definition (HD) video becomes an important issue. The data size for HD video is so large that real-time processing of the data is difficult to implement, especially with software. In order to implement a fast moving picture expert group-2 decoder for HDTV, we compose five scenarios that use parallel processing techniques such as data decomposition, task decomposition, and pipelining. Assuming the multi digital signal processor environments, we analyze each scenario in three aspects: decoding speed, L1 memory size, and bandwidth. By comparing the scenarios, we decide the most suitable cases for different situations. We simulate the scenarios in the dual-core and dual-central processing unit environment by using OpenMP and analyze the simulation results.

  • PDF