• Title/Summary/Keyword: Shift-and-add

Search Result 66, Processing Time 0.023 seconds

A Study on Visualization of Digital Wunderkammer Focusing on the Artworks of Mark Leckey (디지털 분더캄머의 시각화에 대한 연구: 마크 레키의 작품을 중심으로)

  • Kim, Sang Min;Park, Hyesu
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.674-682
    • /
    • 2018
  • In the time of the Fourth Industrial Revolution, we endlessly cross between the virtual and the real in our daily routine. Information saving method has changed from physical to virtual and the contents of a digital device can be a method of showing one's identity. A digital device can be seen as a virtual version of a 'wuderkammer'. With this perspective, this study focuses on the changes that has occurred in our daily interaction, the process of thinking, perceiving, and understanding in the time of 'digital wunderkammer'. In order to discuss this matter, this study looks at the two art work series - 'Universal Addressability of Dumb Things' and 'UniAddDumThs' - by a British artist, Mark Leckey and analyzes the digital environment of today, its visual expression, and the characteristic of 'digital wunderkammer' reflected in his art works. Through this study, we hope that the readers can understand the paradigm shift of today and expand the creative possibilities in this new era of digital revolution.

BS-PLC(Both Side-Packet Loss Concealment) for CELP Coder (CELP 부호화기를 위한 양방향 패킷 손실 은닉 알고리즘)

  • Lee In-Sung;Hwang Jeong-Joon;Jeong Gyu-Hyeok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.127-134
    • /
    • 2005
  • Lost packet robustness is an most important quality measure for voice over IP networks(VoIP). Recovery of the lost packet from the received information is crucial to realize this robustness. So, this paper proposes the lost packet recovery method from the received information for real-time communication for CELP coder. The proposed BS-PLC (Both Side Packet Loss Concealment) based WSOLA(Waveform Shift OverLab Add) allow the lost packet to be recovered from both the 'previous' and 'next' good packet as the LP parameter and the excitation signal are respectively recovered. The burst of packet loss is modeled by Gilbert model. The proposed scheme is applied to G.729 most used in VoIP and is evaluated through the SNR(signal to noise) and the MOS(Mean Opinion Score) test. As a simulation result, The proposed scheme provide 0.3 higher in Mean Opinion Score and 2 dB higher in terms of SNR than an error concealment procedure in the decoder of G.729 at $20\%$ average packet loss rate.

Low-power Design and Implementation of IMT-2000 Interpolation Filter using Add/Sub Processor (덧셈 프로세서를 사용한 IMT-2000 인터폴레이션 필터의 저전력 설계 및 구현)

  • Jang Young-Beom;Lee Hyun-Jung;Moon Jong-Beom;Lee Won-Sang
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.1
    • /
    • pp.79-85
    • /
    • 2005
  • In this paper, low-power design and implementation techniques for IMT-2000 interpolation filter are proposed. Processor technique for DA(Distributed Arithmetic) filter and minimization technique for number of addition in CSD(Canonic Signed Digit) filter are utilized for low-power implementation. proposed filter structure consists of 3 blocks. In the first CSD coefficient block, every possible 4 bit CSD coefficients are calculated and stored. In second processor block, multiplication is done by MUX and addition processor in terms of filter coefficient. Finally, in third shift register block, multiplied values are output and stored in shift register. For IMT-2000 interpolation filter, proposed and conventional structures are implemented by using Verilog-HDL coding. Gate counts for the proposed structure is reduced to 31.57% comparison with those of the conventional one.

Analysis of Integration and Growth Factors for Maritime Industry -With focus on Jeollanamdo Province-

  • Kim, Un-Soo;Kim, Hwa-Young
    • Journal of Navigation and Port Research
    • /
    • v.43 no.2
    • /
    • pp.122-133
    • /
    • 2019
  • The maritime industry has emerged as a new growth engine. The municipalities that own the port are trying to add value through the maritime industry. Overseas port cities are also creating maritime industrial clusters to generate profits and strengthen competitiveness. Therefore, it is very important to understand the comparative status of the domestic maritime industry by region. Based on this analysis, it is possible to establish maritime industrial clusters and strategies for integration. This study analyzed the structure of the maritime industry located in Jeollanamdo province, the southwestern part of Korea. Through the analysis of existing literature, the maritime industry was reclassified into 5 major categories, 21 subcategories, and 84 subcategories. Based on the reclassified maritime industry, the analysis of the Jeollanamdo province maritime industry was based on applying the location quotient and the shift-share analysis. As a result of analyzing the geographical location of Jeollanamdo province, other industries showed the highest value of 2.790, followed by fisheries (2.227), shipbuilding industry (1.164) and marine tourism industry (0.554). The growth effect of the maritime industry in Jeollanamdo province was 35,323 people, and net growth effect excluding national growth effect was 11,945 people. In particular, the net growth effect of the shipbuilding industry was the highest at 11,320, followed by shipping logistics (6,371) and marine tourism (1,529). On the other hand, there was no net growth effect in fisheries. The results of this study can be used as basic data for the construction of the maritime industrial cluster for Jellanamdo province in the future.

Study for Balanced Encoding Method against Side Channel Analysis (부채널 분석에 안전한 밸런스 인코딩 기법에 관한 연구)

  • Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1443-1454
    • /
    • 2016
  • Balanced encoding method that implement Dual-rail logic style based on hardware technique to software is efficient countermeasure against side-channel analysis without additional memory. Since balanced encoding keep Hamming weight and/or Hamming distance of intermediate values constantly, using this method can be effective as countermeasure against side channel analysis due to elimination of intermediate values having HW and/or HD relating to secret key. However, former studies were presented for Constant XOR operation, which can only be applied to crypto algorithm that can be constructed XOR operation, such as PRINCE. Therefore, our first proposal of new Constant ADD, Shift operations can be applied to various symmetric crypto algorithms based on ARX. Moreover, we did not used look-up table to obtain efficiency in memory usage. Also, we confirmed security of proposed Constant operations with Mutual Information Analysis.

Development of Virtual Target Signal Generator for Verifying the Shipborne Tracking Radar Performance (함정용 추적레이더 성능 검증을 위한 모의표적신호발생장치 개발)

  • Yi, Hui-Min;Son, Jae-Hyun;Na, Young-Jin;Kim, Dong-Hawn
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.66-74
    • /
    • 2012
  • The virtual target signal generator was developed to verify the shipborne tracking radar performance. It was used to DRFM(Digital RF Memory) method to generate the virtual moving targets. The target signal includes Doppler shift and RCS according to the target motion. And the signal generator can make jamming signal and clutter to test shipborne radar performance at real environmental condition. This paper described the functional diagram and the hardware configuration items to meet the test requirements for the tracking radar. And it showed the critical design points for the sub-systems. The signal generator which was developed in this paper shared the operational information of the radar with the radar command and control part. To test the frequency agility of the radar, it had the local oscillator which could do high speed frequency switching according to radar information. By communicating between the signal generator and the radar command and control part, the local oscillator of signal generator could be controlled every pulse. It reduced the instantaneous bandwidth of signal generator and minimized the spurious. So it lowered the probability of generating wrong targets.

Design of Low-Area HEVC Core Transform Architecture (저면적 HEVC 코어 변환기 아키텍쳐 설계)

  • Han, Seung-Mok;Nam, Woo-Jin;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2013
  • This paper proposes and implements an core transform architecture, which is one of the major processes in HEVC video compression standard. The proposed core transform architecture is implemented with only adders and shifters instead of area-consuming multipliers. Shifters in the proposed core transform architecture are implemented in wires and multiplexers, which significantly reduces chip area. Also, it can process from $4{\times}4$ to $16{\times}16$ blocks with common hardware by reusing processing elements. Designed core transform architecture in 0.13um technology can process a $16{\times}16$ block with 2-D transform in 130 cycles, and its gate count is 101,015 gates.

Research Trend of Additive Manufacturing Technology - A=B+C+D+E, add Innovative Concept to Current Additive Manufacturing Technology: Four Conceptual Factors for Building Additive Manufacturing Technology -

  • Choi, Hanshin;Byun, Jong Min;Lee, Wonsik;Bang, Su-Ryong;Kim, Young Do
    • Journal of Powder Materials
    • /
    • v.23 no.2
    • /
    • pp.149-169
    • /
    • 2016
  • Additive manufacturing (AM) is defined as the manufacture of three-dimensional tangible products by additively consolidating two-dimensional patterns layer by layer. In this review, we introduce four fundamental conceptual pillars that support AM technology: the bottom-up manufacturing factor, computer-aided manufacturing factor, distributed manufacturing factor, and eliminated manufacturing factor. All the conceptual factors work together; however, business strategy and technology optimization will vary according to the main factor that we emphasize. In parallel to the manufacturing paradigm shift toward mass personalization, manufacturing industrial ecology evolves to achieve competitiveness in economics of scope. AM technology is indeed a potent candidate manufacturing technology for satisfying volatile and customized markets. From the viewpoint of the innovation technology adoption cycle, various pros and cons of AM technology themselves prove that it is an innovative technology, in particular a disruptive innovation in manufacturing technology, as powder technology was when ingot metallurgy was dominant. Chasms related to the AM technology adoption cycle and efforts to cross the chasms are considered.

A Framework of Recognition and Tracking for Underwater Objects based on Sonar Images : Part 2. Design and Implementation of Realtime Framework using Probabilistic Candidate Selection (소나 영상 기반의 수중 물체 인식과 추종을 위한 구조 : Part 2. 확률적 후보 선택을 통한 실시간 프레임워크의 설계 및 구현)

  • Lee, Yeongjun;Kim, Tae Gyun;Lee, Jihong;Choi, Hyun-Taek
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.164-173
    • /
    • 2014
  • In underwater robotics, vision would be a key element for recognition in underwater environments. However, due to turbidity an underwater optical camera is rarely available. An underwater imaging sonar, as an alternative, delivers low quality sonar images which are not stable and accurate enough to find out natural objects by image processing. For this, artificial landmarks based on the characteristics of ultrasonic waves and their recognition method by a shape matrix transformation were proposed and were proven in Part 1. But, this is not working properly in undulating and dynamically noisy sea-bottom. To solve this, we propose a framework providing a selection phase of likelihood candidates, a selection phase for final candidates, recognition phase and tracking phase in sequence images, where a particle filter based selection mechanism to eliminate fake candidates and a mean shift based tracking algorithm are also proposed. All 4 steps are running in parallel and real-time processing. The proposed framework is flexible to add and to modify internal algorithms. A pool test and sea trial are carried out to prove the performance, and detail analysis of experimental results are done. Information is obtained from tracking phase such as relative distance, bearing will be expected to be used for control and navigation of underwater robots.

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation (가시광 통신에서 성능 저하 없는 보안 인코딩 연구)

  • Kim, Minchul;Suh, Taeweon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.