• Title/Summary/Keyword: Space communications

Search Result 2,127, Processing Time 0.028 seconds

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

An Effective Method to Treat The Boundary Pixels for Image Compression with DWT (DWT를 이용한 영상압축을 위한 경계화소의 효과적인 처리방법)

  • 서영호;김종현;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.618-627
    • /
    • 2002
  • In processing images using 2 dimensional Discrete Wavelet Transform(2D-DWT), the method to process the pixels around the image boundary may affect the quality of image and the cost to implement in hardware and software. This paper proposed an effective method to treat the boundary pixels, which is apt to implement in hardware and software without losing the quality of the image costly. This method processes the 2-D image as 1-D array so that 2-D DWT is performed by considering the image with the serial-sequential data structure (Serial-Sequential Processing). To show the performance and easiness in implementation of the proposed method, an image compression codec which compresses image and reconstructs it has been implemented and experimented. It included log-scale fried quantizer, but the entropy coder was not implemented. From the experimental results, the proposed method showed the SNR of almost the same SNR(Signal to Noise Ratio) to the Periodic Expansion(PE) method when the compression ratio(excluding entropy coding) of 2:1, 15.3% higher than Symmetric Expansion(SE) method, and 9.3% higher than 0-pixel Padding Expansion(ZPE) method. Also PE method needed 12.99% more memory space than the proposed method. By considering only the compression process, SE and ZPE methods needed additional operations than the proposed one. In hardware implementation, the proposed method in this paper had 5.92% of overall circuit as the control circuit, while SE, PE, and ZPE method has 22%, 21,2%, and 11.9% as the control circuit, respectively. Consequently, the proposed method can be thought more effective in implementing software and hardware without losing any image quality in the usual image processing applications.

Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan;Wang, Wenbo;Zhao, Hui;Zhao, Long
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.374-384
    • /
    • 2012
  • Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

An Improved Search Space for QRM-MLD Signal Detection for Spatially Multiplexed MIMO Systems (공간다중화 MIMO 시스템의 QRM-MLD 신호검출을 위한 개선된 탐색공간)

  • Hur, Hoon;Woo, Hyun-Myung;Yang, Won-Young;Bahng, Seung-Jae;Park, Youn-Ok;Kim, Jae-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.403-410
    • /
    • 2008
  • In this paper, we propose a variant of the QRM-MLD signal detection method that is used for spatially multiplexed multiple antenna system. The original QRM-MLD signal detection method combines the QR decomposition with the M-algorithm, thereby significantly reduces the prohibitive hardware complexity of the ML signal detection method, still achieving a near ML performance. When the number of transmitter antennas and/or constellation size are increased to achieve higher bit rate, however, its increased complexity makes the hardware implementation challenging. In an effort to overcome this drawback of the original QRM-MLD, a number of variants were proposed. A most strong variant among them, in our opinion, is the ranking method, in which the constellation points are ranked and computation is performed for only highly ranked constellation points, thereby reducing the required complexity. However, the variant using the ranking method experiences a significant performance degradation, when compared with the original QRM-MLD. In this paper, we point out the reasons of the performance degradation, and we propose a novel variant that overcomes the drawbacks. We perform a set of computer simulations to show that the proposed method achieves a near performance of the original QRM-MLD, while its computational complexity is near to that of the QRM-MLD with ranking method.

Statistical Analysis of Projection-Based Face Recognition Algorithms (투사에 기초한 얼굴 인식 알고리즘들의 통계적 분석)

  • 문현준;백순화;전병민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5A
    • /
    • pp.717-725
    • /
    • 2000
  • Within the last several years, there has been a large number of algorithms developed for face recognition. The majority of these algorithms have been view- and projection-based algorithms. Our definition of projection is not restricted to projecting the image onto an orthogonal basis the definition is expansive and includes a general class of linear transformation of the image pixel values. The class includes correlation, principal component analysis, clustering, gray scale projection, and matching pursuit filters. In this paper, we perform a detailed analysis of this class of algorithms by evaluating them on the FERET database of facial images. In our experiments, a projection-based algorithms consists of three steps. The first step is done off-line and determines the new basis for the images. The bases is either set by the algorithm designer or is learned from a training set. The last two steps are on-line and perform the recognition. The second step projects an image onto the new basis and the third step recognizes a face in an with a nearest neighbor classifier. The classification is performed in the projection space. Most evaluation methods report algorithm performance on a single gallery. This does not fully capture algorithm performance. In our study, we construct set of independent galleries. This allows us to see how individual algorithm performance varies over different galleries. In addition, we report on the relative performance of the algorithms over the different galleries.

  • PDF

Virtual Tactical Map : Military Briefing Tools for Virtual Training based on Augmented Reality (가상 전술 지도 : 증강현실에 기반한 군사 훈련 브리핑 도구)

  • Jung Kyung-Boo;Lee Sang-Won;Choi Byung-Uk;Jeong Seung-Do
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.341-350
    • /
    • 2006
  • The sand table training is one of the most effective training method in military operations which can accomplish missions such as simulation and rehearsal without limitations related to time, space, money and so on. Previous sand table training has many problems like that the sand table cannot represent real field condition because of its physical properties. So, it is hard to be preserved and impossible to include much of information into them. In this paper, we make an approach based on Augmented Reality(AR) to solve these problems and propose an efficient military training briefing tool with virtual sand table environment described as actual battle field Virtual Tactical Map(VTM) can realize a virtual military training with simple action like moving marker or tangible interface by hand. Real-time state information of VTM gives us more organic intelligence for entire situation. Tangible AR interface provides users with a contents authoring tool that is natural, intuitive and easy to deal with as interaction between user in real world and system that augmented real world with virtual object. VTM is a newly designed military training briefing tools. A military training content can be reproduced and it is possible that user uses this content later. Thus, it shows us potential possibilities of AR applications on military leaning field.

Intelligent Motion Planning System for an Autonomous Mobil Robot (자율 이동 로봇을 위한 지능적 운동 계획 시스템)

  • 김진걸;김정찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.8
    • /
    • pp.1503-1517
    • /
    • 1994
  • Intelligent Motion Planning System(IMPS) is presented for a robot to achieve an efficient path toward the given target point in two dimensional unknown environment is constructed with unrestricted obstacle shapes. IMPS consists of three components for making intelligent motion. These components are real-time motion planning algorithm based on a discontinous boundary method, fuzzy neural network decision system for heuristic knowledge representation, and world modeling with forgetting and reinforcing memory cells. First of all, in real-time motion planning algorithm, the behavior-based architectural method is used to generate subgoal. A behavior generates a subgoal independently by using the method of discontinuous boundary in sensed area. The discontinuous boundary method is a new proposed fast obstacle avoidance algorithm. The second component is fuzzy neural network decision system for accomplishing the subgoal. The heuristic rules are imbedded on the fuzzy neural network to make an intelligent decision. The last one is a forgetting, reinforcing memory technique for the construction of external world map. The activation values of all activated memory cells in grid space are decreased monotonically and after all they are burned out. Therefore, after sufficient journey, robot can have a stationary world map even if the dynaic obstacles exist. Using the IMPS, several simulations show the efficient achievement of target point in unknown enviroment with obstcles of various shapes.

  • PDF

Communication Data Format Design for LEO Satellite with Packet Utilization Standard (Packet Utilization 개념을 이용한 저궤도 위성의 데이터 통신 포맷 설계)

  • Lee, Na-Young;Lee, Jin-Ho;Suk, Byong-Suk
    • Journal of Satellite, Information and Communications
    • /
    • v.3 no.2
    • /
    • pp.13-17
    • /
    • 2008
  • The conventional telemetry system of Korean low-earth orbiting satellites has certain limitations in accommodating various missions. As the payload becomes complex, it requires very complicated operational concepts in terms of telemetry. With the current design, the telemetry formats have to be rebuilt whenever new payloads or operation concepts are involved, and many constraints in operation shall be produced due to the lacks of its flexibility. As the capability and performance of a satellite have been improved, the communication structure of the satellite should be improved to gather more telemetry data. For the efficiency of data handling, it is necessary to change the grid based telemetry system in which the downlink interval and types for telemetry was limited. Comparing the fixed data map such as grid type, the packet based telemetry system can be operated as flexible and various types of packet can be designed such as the dump packet and the event packet. The sequence of the packets can be modified or newly defined to manage the massive satellite state of health data. In this paper, a new strategy for the telemetry development partially derived from PUS (Packet Utilization Standard) of European Space Agency, which provides enhanced features for the accommodation of payloads & operational requirements, is presented.

  • PDF

MIMO-OFDM BPLC over Statistical Power Line Channels with Cross-Talk (크로스 토크를 갖는 통계적 전력선 채널 하에 MIMO-OFDM 광대역 전력선 통신)

  • Yoo, Jeong-Hwa;Choe, Sang-Ho;Pine, Nazcar
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1565-1573
    • /
    • 2011
  • In this paper, we present a MIMO-OFDM broadband power line communication (BPLC) for Smart Grid and its associated applications and analyze its performance over the 3-phase 4-wire power line channels. For practical BPLC system simulation, we adopt the statistical power line fading channel model instead of the existing deterministic fading channel models (Zimmermann model, MTL model, and so on). In this paper, we implement $2{\times}2$ and $3{\times}3$ MIMO schemes using 3-phase 4-wire power lines. We investigate the capacity loss and BER performance of the proposed MIMO system by considering the effect of cross-talk between antenna paths. We choose space-frequency coding in order to reduce frequency interference between subcarriers and employ maximum ratio combining (MRC) that achieves both multiple antenna path diversity gain and multiple fading path diversity gain. We evaluate the proposed system performance through computer simulation in terms of the impulse noise index and the capacity loss ratio and compare the different signal combining schemes including MRC, equal gain combing (EGC), and selection combining (SC).

A Comparative Study on the Regulation System of Public Sphere in the Social Media Space During the Election Campaign (소셜 미디어 관련 온라인 선거 공론장 규제체계 비교연구)

  • Lee, Dong-Hoon;Ryu, Jung-Ho;Jung, Soo-Young
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.74-99
    • /
    • 2011
  • This article tries to find out some regulatory facts to improve and vitalize roles of social media such as facebook, twitter, etc in the election campaign. For this goal, a theoretical approach is based on the agnostic and open aspects of the regulation system of election. Case study and in-depth interview were used as research methods in this article. The results are as follows. First, some differences are in the election regulatory system regarding the roles of social media in UK, US, Japan and Korea. The election public sphere systems of these countries categorized to the types of legal factors to control political communications in election public sphere; free-speech oriented system(UK. US), limited free-speech oriented system(Korea), normative-oriented system(Japan). Second, most respondents answered they agreed with some improvement ideas to reflect needs of netizen and academic who suggest to minimize regulatory burdens on social media in the political communication during the election campaign.

  • PDF