• Title/Summary/Keyword: IP.010

Search Result 15, Processing Time 0.02 seconds

A study on aberration and FOV improvement of a holographic HMD element (홀로그래픽 HMD 소자의 수차 및 시야각 향상에 관한 연구)

  • 김희동;정만호
    • Korean Journal of Optics and Photonics
    • /
    • v.12 no.5
    • /
    • pp.418-424
    • /
    • 2001
  • A holographic HMD element having low aberrations and high diffraction efficiency over wide FOV has been fabricated. In order to design the HOE having low aberrations a recursive technique was used. To obtain the HOE having low aberrations as well as high diffraction efficiency over a wide FOV, we used an intermediate hologram and the grating function of the aberration corrected hologram was transferred to the final hologram through it. For the fabricated final HMD element, we got the results of spot size improved about 10 times and high diffraction efficiency over FOV of $\pm$10$^{\circ}$.

  • PDF

IMT: A Memory-Efficient and Fast Updatable IP Lookup Architecture Using an Indexed Multibit Trie

  • Kim, Junghwan;Ko, Myeong-Cheol;Shin, Moon Sun;Kim, Jinsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1922-1940
    • /
    • 2019
  • IP address lookup is a function to determine nexthop for a given destination IP address. It takes an important role in modern routers because of its computation time and increasing Internet traffic. TCAM-based IP lookup approaches can exploit the capability of parallel searching but have a limitation of its size due to latency, power consumption, updatability, and cost. On the other hand, multibit trie-based approaches use SRAM which has relatively low power consumption and cost. They reduce the number of memory accesses required for each lookup, but it still needs several accesses. Moreover, the memory efficiency and updatability are proportional to the number of memory accesses. In this paper, we propose a novel architecture using an Indexed Multibit Trie (IMT) which is based on combined TCAM and SRAM. In the proposed architecture, each lookup takes at most two memory accesses. We present how the IMT is constructed so as to be memory-efficient and fast updatable. Experiment results with real-world forwarding tables show that our scheme achieves good memory efficiency as well as fast updatability.

An Integrated E-model Implementation for Speech Quality Measurement in VoIP and VoLTE (VoIP와 VoLTE 음성 품질 측정을 위한 통합 E-model 구현)

  • Kim, Bog-Soon;Baek, Kwang-Hyun;Cho, Gi-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.10-18
    • /
    • 2013
  • With advancing of mobile communication services and commercializing of VoLTE (Voice of LTE), it is getting to pay attention on QoS of VoLTE. This paper proposes an integrated E-model in which some factors influenced to service quality of VoIP and VoLTE based voice communication system are considered in calculating the voice quality of Wideband Codec. The model aims to calculate R value which reflects the situations of access network, network characteristics, terminals' usage and mobility. We mainly deal with the integrated E-model's structure, related algorithms and optimal parameters for VoLTE. Some experiments show that the voice quality difference between VoIP and VoiceChecker, and VoLTE and POLQA, is below 10%. With the proposed model, we can calculate the voice quality by making use of the factors directly affected to service quality and the environment of VoLTE terminal and network. As a result, we can estimate the service quality in advance, without measuring it in real wireless environment.

Optical image encryption by use of double random phase mask and analysis of its encryption level (이중 임의 위상판을 이용한 광학상의 암호화 및 암호화 수준 분석)

  • 김병철;차성도;신승호
    • Korean Journal of Optics and Photonics
    • /
    • v.13 no.1
    • /
    • pp.79-83
    • /
    • 2002
  • We present a method to improve encryption level by use of a rotational term in the double random-phase-mask(RPM) encryption system. Encrypted optical images are recorded in a photorefractive LiNbO$_3$:Fe crystal and reconstructed by using a phase conjugated reading beam. The encryption level for the analog image is analyzed by use of visibility function.

Progress in the modification of reverse osmosis (RO) membranes for enhanced performance

  • Otitoju, T.A.;Saari, R.A.;Ahmada, A.L.
    • Journal of Industrial and Engineering Chemistry
    • /
    • v.67
    • /
    • pp.52-71
    • /
    • 2018
  • RO membranes, the core elements for RO process formed using polyamide, have found prominent space in membrane technology. RO membranes with better application perspective could be achieved by precise controlling the kinetics of IP reaction and surface modification strategy. Despite huge progresses, great challenges still exist in trade-off between flux, rejections and fouling. More works are necessary to enhance the performance and stability of RO membranes via surface modification. Further insights into the use of natural monomers are necessary. It is anticipated that this article can provide clues for further in-depth evaluation and research in exploring more advanced RO membranes.

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

Optical feature extraction by use of an array of the Hough transform filters (Hough 변환 필터 배열을 이용한 광학적 특징 추출)

  • 장주석;신동학;강영수
    • Korean Journal of Optics and Photonics
    • /
    • v.12 no.1
    • /
    • pp.55-60
    • /
    • 2001
  • We propose a method to extract features optically from the input pattern by use of an array of Hough transfOllli filters. Here the subparts of the input pattern are Hough-transformed by. their cOlTesponding elements of the filter array independently and simultaneously. Compared with the conventional method, in which the whole input pattern is Hough-transformed by a single optical filter, the proposed method not only provides the improved optical transform results when the input pattern becomes complex but also extracts the approximate position information of the line segment features. To show the feasibility of this approach, we fabricated a $5\times5$ filter array and performed preliminary experiments.iments.

  • PDF

Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs

  • Sun, Baolin;Gui, Chao;Song, Ying;Chen, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1298-1310
    • /
    • 2019
  • Network coding (NC) is a promising technology that can improve available bandwidth and packet throughput in wireless sensor networks (WSNs). Sliding window is an improved technology of NC, which is a supplement of TCP/IP technology and can improve data throughput and network lifetime on WSNs. This paper proposes a network coding-based maximum lifetime algorithm for sliding window in WSNs (NC-MLSW) which improves the throughput and network lifetime in WSN. The packets on the source node are sent on the WSNs. The intermediate node encodes the received original packet and forwards the newly encoded packet to the next node. Finally, the destination node decodes the received encoded data packet and recovers the original packet. The performance of the NC-MLSW algorithm is studied using NS2 simulation software and the network packet throughput, network lifetime and data packet loss rate were evaluated. The simulations experiment results show that the NC-MLSW algorithm can obviously improve the network packet throughput and network lifetime.

An Approach to the Localization of Technology for a Transport and Storage Container for Very Low-Level Radioactive Liquid Waste

  • Shin, Seung Hun;Choi, Woo Nyun;Yoon, Seungbin;Lee, Un Jang;Park, Hye Min;Kim, Hee Reyoung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.20 no.1
    • /
    • pp.127-131
    • /
    • 2022
  • The structural safety of prototype transport and storage containers for very low-level radioactive liquid waste was experimentally estimated for its localization development. Transport containers for radioactive liquid waste have been researched and developed, however, there are no standardized commercial containers for very low-level radioactive waste in Korea. In this study, the structural safety of the designated IP-2 type container capable of transporting and temporarily storing large amounts of very low-level liquid waste, which is generated during the operation and decommissioning of nuclear power plants, was demonstrated. The stacking and drop tests, which were conducted to determine the structural integrity of the container, verified that there was no external leakage of the contents in spite of its structural deformation due to the drop impact. This study shows the effort required for the localization of the technology used in manufacturing transport and storage containers for very low-level radioactive liquid waste, and the additional structural reinforcement of the container in which the commercial intermediate bulk container (IBC) external frame was coupled.

A Study on the Appropriateness of Intellectual Property Valuation: The Patent Valuation of Korea Technology Finance Corporation (지식재산평가의 적정성에 대한 연구: 기술보증기금의 특허가치평가를 중심으로)

  • Park, Youngsu;Choi, Sungho
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.195-210
    • /
    • 2020
  • Recently, the value of intellectual property rights including patents has been estimated for various purposes. In particular, the evaluation of loans, guarantees and collateral through patent valuation is increasing with the revitalization of technology financing. Although various studies have been conducted on patent valuation, little research has been done on the adequacy of patent valuation. In this study, using the DCF model, which is the most commonly used method of technology valuation, we examine the appropriateness of the patent valuation by comparing and analyzing the estimated value and actual value of the patent. An empirical result shows that the difference between estimated value and the actual value is statistically significant, and there is a significant difference between the estimated value and the actual value depending on the classification of evaluation work. In addition, while there is no difference between professors, patent attorneys, and researchers in the analysis of value differences according to technical evaluators, there is a significant difference between patent attorneys and other evaluators. Finally, we find a significant value difference between estimated value and actual value of technology subject to evaluation by industry.