• Title/Summary/Keyword: Feedback Quantization

Search Result 57, Processing Time 0.026 seconds

MPEG-4 Video Frame-based Bitrate Control using 2D History Pool and Sliding Window (2차원 히스토리 풀과 슬라이딩 윈도우를 이용한 MPEG-4 비디오 프레임 기반 비트 생성율 제어 방법)

  • Park, Gwang-Hoon;Lee, Yoon-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.6
    • /
    • pp.355-366
    • /
    • 2002
  • This paper introduces the MPEG-4 video frame-based bitrate control methodology using two dimensional history pool and a sliding window. Proposed method preferentially clusters the encoded results according to the image characteristics and stores those results into the 2 dimensional history pool. Among the stored results in the pool, the sliding window collects the encoded results whose characteristics are very similar to the image frame to be encoded. Feedback regression is finally carried out bated on the collected results. Therefore proposed method can actively adapt to the rapid varying image characteristics by reducing the occurrences of the extrapolations when determining the quantization steps. Proposed method has better performances than the MPEG-4 frame-based bitrate control algorithm by evaluating with the actually encoded bits per frame, encoded PSNR's, and frame skips.

Performance Analysis of Dual-Layer Differential Precoding Technique Using 8-PSK Constellation (8-PSK 성운을 이용하는 이중계층 차분 선부호화 기법의 성능 분석)

  • Park, Noe-Yoon;Kim, Young-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.5
    • /
    • pp.401-408
    • /
    • 2013
  • Dual-layer differential codebook using 8-PSK (phase shift keying) constellation as its codeword elements, is proposed for Long term evolution (LTE) and/or LTE-Advanced systems. Due to the temporal correlation of the adjacent channel matrices, the consecutive precoding matrices are likely to be similar. This approach quantize only the differential information of the channel instead of the whole channel subspace, which virtually increase the codebook size to realize more accurate quantization of the channel. Especially, the proposed codebook has the same properties of LTE release-8 codebook that is, constant modulus, complexity reduction, and nested property. The mobile station can be designed by using less expensive non-linear amplifier utilizing constant modulus property. Computer simulations show that the capacity of the proposed dual-layer codebook performs almost 1.2dB better than those of any other non-differential codebooks with the same amount of feedback information.

A Novel Differential Equal Gain Transmission Technique using M-PSK Constellations in MIMO System (MIMO 시스템에서 M-PSK 성운을 이용한 새로운 차분 동 이득 전송 기술)

  • Kim, Young-Ju;Seo, Chang-Won;Park, Noeyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.24-31
    • /
    • 2015
  • A differential codebook using M-ary phase shift keying (M-PSK) constellation as its codeword elements, is proposed for Long term evolution (LTE), LTE-Advanced (LTE-A), and/or WiMAX systems. Due to the temporal correlation of the adjacent channel, the consecutive precoding matrices are likely to be similar. This approach quantize only the differential information of the channel instead of the whole channel subspace, which virtually increase the codebook size to realize more accurate quantization of the channel. Especially, the proposed codebook has the same properties of LTE release-8 codebook that is, constant modulus, complexity reduction, and nested property. The mobile station can be designed by using a less expensive non-linear amplifier utilizing the constant modulus property. Computer simulations show that the capacity of the proposed codebook performs better than LTE release-8 codebook with the same amount of feedback information.

A Novel Dual-Layer Differential Equal Gain Transmission Technique Using M-PSK Constellations (M-PSK 성운을 이용한 새로운 이중계층 차분 동 이득 전송 기술)

  • Kim, Young-Ju;Seo, Chang-Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.7
    • /
    • pp.627-635
    • /
    • 2015
  • We propose a dual-layer differential equal-gain codebook design methodology for LTE-Advanced(LTE-A), IEEE802.ac, and radar system having multiple transmit and receive antennas, and make computer simulations to evaluate its link-level performaces. M-ary phase shift keying constellation is used as its codeword elements to utilize low-cost power amplifiers at mobile stations. Especially, the proposed codebook can meet radar systems requirement for the high-powered equal-gain transmission property. Due to the temporal correlation of the adjacent channel, the proposed differential codebook can quantize only the differential information of the channel instead of the whole channel subspace, which virtually increase the codebook size to realize more accurate quantization of the channel. The proposed codebook has the same properties of LTE codebook that is, constant modulus, complexity reduction, and nested property. Computer simulations show that the proposed codebook performs better than the conventional 8-ary codebooks with the same amount of feedback information.

Efficient Cognitive and Cooperative Communication Scheme for Multiuser OFDMA Systems using Relays (중계기를 사용하는 다중 사용자 OFDMA 시스템을 위한 효율적인 인지 협력 통신 기법)

  • Kang, Min-Gyu;Sang, Young-Jin;Ko, Byung-Hoon;Kim, Kwang-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.235-243
    • /
    • 2009
  • In this paper, we investigate the cognitive and cooperative communication scheme to improve the spectral efficiency in multiuser OFDMA systems using wireless relays. First, we propose the frame structure in which the efficient frequency reuse scheme with the cognitive technique is performed to increase the system throughput. And in the case where the THP (Tomlinson-Harashima preceding) is used for the elimination of interference from the relay, we derive the effective signal to noise ratio of the link largely affected by the channel quantization error. From the system level simulation results, it is shown that the proposed cognitive and cooperative communication scheme increases the overall system performance including the feedback overhead.

Performance Improvement of Downlink Real-Time Traffic Transmission Using MIMO-OFDMA Systems Based on Beamforming (Beamforming 기반 MIMO-OFDMA 시스템을 이용한 하향링크 실시간 트래픽 전송 성능 개선)

  • Yang Suck-Chel;Park Dae-Jin;Shin Yo-An
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.1-9
    • /
    • 2006
  • In this paper, we propose a MIMO-OFDMA (Multi Input Multi Output-Orthogonal Frequency Division Multiple Access) system based on beamforming for performance improvement of downlink real-time traffic transmission in harsh channel conditions with low CIR (Carrier-to-Interference Ratio). In the proposed system, we first consider the M-GTA-SBA (Modified-Grouped Transmit Antenna-Simple Bit Allocation) using effective CSI (Channel State Information) calculation procedure based on spatial resource grouping, which is adequate for the combination of MRT (Maximum Ratio Transmission) in the transmitter and MRC (Maximum Ratio Combining) in the receiver. In addition, to reduce feedback information for the beamforming, we also apply QEGT (Quantized Equal Gain Transmission) based on quantization of amplitudes and phases of beam weights. Furthermore, considering multi-user environments, we propose the P-SRA (Proposed-Simple Resource Allocation) algorithm for fair and efficient resource allocation. Simulation results reveal that the proposed MIMO-OFDMA system achieves significant improvement of spectral efficiency in low CRI region as compared to a typical open-loop MIMO-OFDMA system using pseudo-orthogonal space time block code and H-ARQ IR (Hybrid-Automatic Repeat Request Incremental Redundancy).

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.