• Title/Summary/Keyword: Point-to-Point Communications

Search Result 1,148, Processing Time 0.022 seconds

Implementation of Internet Terminal using G.729.1 Wideband Speech Codec for Next Generation Network (차세대 통신망을 위한 G.729.1 광대역 음성 코덱을 활용한 인터넷 단말 구현)

  • So, Woon-Seob;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.939-945
    • /
    • 2008
  • Tn this paper we described the process and the results of an implementation of Internet terminal using G.729.1 wideband speech codec for next generation network. For this purpose firstly we chose a high performance RISC application processor having DSP features for speech codec processing and enhanced Multimedia Accelerator(eMMA) function for video codec. In the implementation of this terminal, we used G.729.1 codec recently standardized in ITU-T which is a new scalable speech and audio codec that extends 0.729 speech coding standard. To adopt G.729.1 codec to this terminal we transformed most of the fixed point C codes which require more complexity into assembly codes so as to minimize processing time in the processor. As a result of this work we reduced the execution time of the original C codes about 80% and operated in real time on the terminal. For video we used H.263/MPEG-4 codec which is supported by the eMMA with hardware in the processor. In the SIP call processing test connected to real network we obtained under looms end-to-end delay and 3.8 MOS value measured with PESQ instrument. Besides this terminal operated well with commercial terminals.

Structure of Data Fusion and Nonlinear Statistical Track Data Fusion in Cooperative Engagement Capability (협동교전능력을 위한 자료융합 구조와 비선형 통계적 트랙 융합 기법)

  • Jung, Hyoyoung;Byun, Jaeuk;Lee, Saewoom;Kim, Gi-Sung;Kim, Kiseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.17-27
    • /
    • 2014
  • As the importance of Cooperative Engagement Capability and network-centric warfare has been dramatically increasing, it is necessary to develop distributed tracking systems. Under the development of distributed tracking systems, it requires tracking filters and data fusion theory for nonlinear systems. Therefore, in this paper, the problem of nonlinear track fusion, which is suitable for distributed networks, is formulated, four algorithms to solve the problem of nonlinear track fusion are introduced, and performance of introduced algorithms are analyzed. It is a main problem of nonlinear track fusion that cross-covarinaces among multiple platforms are unknown. Thus, in order to solve the problem, two techniques are introduced; a simplification technique and a approximation technique. The simplification technique that help to ignore cross-covariances includes two algorithms, i.e. the sample mean algorithm and the Millman formula algorithm, and the approximation technique to obtain approximated cross-covariances utilizes two approaches, by using analytical linearization and statistical linearization based on the sigma point approach. In simulations, BCS fusion is the most efficient scheme because it reduces RMSE by approximating cross-covariances with low complexity.

A Study on the IT Outsourcing for Service Level Agreement in Public Agencies (공공기관에서의 서비스 수준 협약(SLA)에 따른 IT 아웃소싱에 관한 연구)

  • Lee, Sung Ho;Kim, Hee Wan;Kim, Dong Soo
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.47-59
    • /
    • 2012
  • With the rapid development of the Internet, public agencies and private companies introduced 'IT outsourcing in order to maintain and repair the information systems. Also they have utilized the SLA in order to manage it. Although IT outsourcing as a way to promote effective SLA are being introduced, the introduction of service level agreements or those introduced universal effectiveness did not demonstrate in the public agencies. The importance of outsourcing in the information systems is growing, but the increase in size of the business information, IT technology diversification, expansion of information between systems interconnection, information system operating and maintenance costs with the increase of information systems to streamline operations, increase the need for versatility is growing gradually. In this paper we investigates IT outsourcing in public agencies as a way to promote effective service level agreement(SLA) with the introduction and consideration, and through the application of SLA mutual customers and IT service organizations make a clear point of management and IT service levels and IT services for improved mind and strengthen the effectiveness of preventive activities can be seen.

  • PDF

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

An Efficient Coding Technique of Holographic Video Signal using 3D Segment Scanning (분할영역의 3차원 스캐닝을 이용한 홀로그래픽 비디오 신호의 효율적인 부호화 기술)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.132-140
    • /
    • 2007
  • In this paper, we proposed a new technique to encode and decode the digital hologram. Since the digital hologram (or fringe pattern) is generated by interference of light, it has much different property from natural 2D (2 dimensional) images. First, we acquisite optical-sensed or computer-generated hologram by digital type, and then extract a chrominance component. The extracted digital hologram for coding is separated into segments to use multi-view properties. The segmented hologram shows the similar characteristics with picturing an object with 2D cameras in various point of view. Since fringe pattern is visually observed like as noise, we expect that the fringe pattern has poor coding efficiency. To obtain high efficiency, the segment is transformed with DCT (Discrete Cosine Transform) which resembles hologram generation process with high performance. Each transformed segment passes the 3D scanning process according to time and spatial correlation, and is organized into a video stream. Since the segment which correspond to frame of a video stream consists of the transformed coefficients with wide range of value, it is classified and re-normalized. Finally it is compressed with coding tools. The proposed algorithm illustrated that it has better properties for reconstruction of 16 times higher compression rate than the previous researches.

DEA Models and Application Procedure for Performance Evaluation on Governmental Funding Projects for IT Small and Medium-sized Enterprises with Exogenously Fixed Variables of Corporate Competency (기업역량을 고려한 외생고정변수를 갖는 IT중소기업 정부자금지원정책 성과평가를 위한 DEA모형 및 활용절차)

  • Park, Sung-Min;Kim, Heon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.364-378
    • /
    • 2008
  • Data Envelopment Analysis(DEA) models can be used for performance evaluation on governmental funding projects for IT small and medium-sized enterprises associated with multiple-outputs/multiple-inputs. In order to enhance the accuracy of DEA efficiency scores, DEA models with exogenously fixed variables are required where the corporate competency is taken into account. Additionally, it is necessary to use multiple DEA basic as well as extended models so as to relax the restriction on the performance evaluation to relying on a single DEA model. In this study; 1)a DEA data structure is designed including exogenously fixed variables representing corporate asset, revenue and the number of employees at the point in time that the governmental funding project concerned is initiated; 2)DEA basic as well as extended models are established according to the DEA data structure presented abovementioned; and 3)a case study is illustrated with an empirical testbed dataset. As for the DEA basic models, CCR, BCC, Super-efficiency model are adopted. The DEA extended models are developed based on the models associated with noncontrollable and nondiscretionary variables. In the case study, it is explained a comparison of DEA models and also major numerical outcomes such as efficiency scores, ranks derived from each DEA model are integrated using Analytic Hierarchy Process(AHP) weights. Performance significance with DEA efficiency scores between technical categories are tested based not only on parametric but also nonparametric single-factor analysis of variance method.

Effective consultation strategy for patients of aesthetic case (심미 증례 환자의 효과적인 상담 전략)

  • Kim, Jumee
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.22 no.1
    • /
    • pp.74-82
    • /
    • 2013
  • In the modern society, the awareness of images is affecting the body-related consumer behavior through mass media such as TV and internet, and SNS that has grown explosively with the wide availability of smartphones. As a consequence, the demands for aesthetic treatments by patients who wish to improve their inferiority complex are increasing. Patients who want aesthetic treatments display more active inclinations than those receiving general treatments, and have the expectation for the improvement in images along with the anxiety over potential functional problems and satisfaction about the outcomes. In the consultation of the patient of aesthetic case, the basic starting point is that the surgeon and the patient recognize improvement points that the patient expects through the aesthetic treatment. The consultation starting from the viewpoint of the patient proceeds in a way that the consensus is reached through the medical approach, eventually finding the balance between ideals and naturalness. The consultation process from the initial meeting is established at each stage of treatment, at which the consultation is correctly recorded and shared by the surgeon and the care staff. In addition, the consistent policy is implemented from the initial consultation through to the maintenance care. Together, these will result in the consultation based on the true communications leading to the outcome that satisfies the patient, the surgeon and the care staff, rather than the one that gives the patient an unfounded hope and leads to the unsympathetic outcome. This article introduces the consultation strategy for patients of aesthetic case based on the sympathy with them through cases of aesthetic treatment by type.

An Improved Search Space for QRM-MLD Signal Detection for Spatially Multiplexed MIMO Systems (공간다중화 MIMO 시스템의 QRM-MLD 신호검출을 위한 개선된 탐색공간)

  • Hur, Hoon;Woo, Hyun-Myung;Yang, Won-Young;Bahng, Seung-Jae;Park, Youn-Ok;Kim, Jae-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.403-410
    • /
    • 2008
  • In this paper, we propose a variant of the QRM-MLD signal detection method that is used for spatially multiplexed multiple antenna system. The original QRM-MLD signal detection method combines the QR decomposition with the M-algorithm, thereby significantly reduces the prohibitive hardware complexity of the ML signal detection method, still achieving a near ML performance. When the number of transmitter antennas and/or constellation size are increased to achieve higher bit rate, however, its increased complexity makes the hardware implementation challenging. In an effort to overcome this drawback of the original QRM-MLD, a number of variants were proposed. A most strong variant among them, in our opinion, is the ranking method, in which the constellation points are ranked and computation is performed for only highly ranked constellation points, thereby reducing the required complexity. However, the variant using the ranking method experiences a significant performance degradation, when compared with the original QRM-MLD. In this paper, we point out the reasons of the performance degradation, and we propose a novel variant that overcomes the drawbacks. We perform a set of computer simulations to show that the proposed method achieves a near performance of the original QRM-MLD, while its computational complexity is near to that of the QRM-MLD with ranking method.

Hardware Implementation of Real-Time Blind Watermarking by Substituting Bitplanes of Wavelet DC Coefficients (웨이블릿 DC 계수의 비트평면 치환방법에 의한 실시간 블라인드 워터마킹 및 하드웨어 구현)

  • 서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.398-407
    • /
    • 2004
  • In this paper, a blind watermarking method which is suitable to the video compression using 2-D discrete wavelet transform was proposed and implemented into the hardware using VHDL(VHSIC Hardware Description Language). The goal of the proposed watermarking algorithm is the authentication about the manipulation of the watermark embedded image and the detection of the error positions. Considering the compressed video image, the proposed watermarking scheme is unrelated to the quantization and is able to concurrently embed or extract the watermark. We experimentally verified that the lowest frequency subband(LL4) is not sensitive to the change in the spatial domain, so LL4 subband was selected for the mark space. And the combination of the bitplanes which has the properties of both the minimum degradation of the image and the robustness was chosen as the embedded Point in the mark space in LL4 subband. Since we know the watermark embedded positions and the watermark is embedded by not varying the value but changing the value, the watermark can be extracted without the original image. Also, for the security when exposing the watermark embedded position, we embed the encrypted watermark by the block cipher. The proposed watermark algorithm shows the robustness against the general image manipulation and is easily transplanted into the image or video compressor with the minimal changing in the structure. The designed hardware has 4037 LABs(24%) and 85 ESBs(3%) in APEX20KC EP20K400CF672C7 FPGA of Altera and stably operates in 82MHz clock frequency.

A Ka-band Harmonic Miter Design Using Multiplier Theory (체배기 이론을 이용한 Ka-대역 고조파 믹서 설계)

  • Go Min-Ho;Kang Suk-Youb;Park Hyo-Dal
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1104-1109
    • /
    • 2005
  • In this paper, a Ka-band harmonic mixer is designed and fabricated on the base of the multiplier theory that there is a bias point to maximize the third harmonic order($3f_{LO}$) with respect to a fundamental LO frequency($f_{LO}$), which can make the high-order mixing element($f_{RF}{\pm}3f_{LO}$) to be greater than other mixing elements, Pumping a RF frequency($f_{RF}$) and LO frequency($f_{LO}$). The harmonic mixer by the proposed design method is fabricated by using a commercial GaAs MESFET device with a plastic package and overcome these disadvantages that a conventional mixer in Ka-band suffer from a high cost, inefficient productivity and circuit complexity. The harmonic mixer have a -10 dB conversion loss at the IF Sequency($3f_{LO}-f_{RF}$=1.0GHz) by selecting a gate bias voltage for the maximum third-order LO harmonic element($3f_{LO}$=34.5 GHz) as pumping LO frequency($f_{LO}$=11.5 GHz) With respect to RF Sequency ($f_{RF}$=33.5GHz)