• Title/Summary/Keyword: Standard Processing

Search Result 2,612, Processing Time 0.034 seconds

A Study on the Network functional standard for MNP between 2G and 3G by QoR (QoR 방식의 2G와 3G간 이동전화 번호이동성 구현을 위한 망기능 규격에 관한 연구)

  • Jeong, Young-Sic;Kim, Sung-Han;Kim, Whan-Woo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.93-94
    • /
    • 2006
  • In this paper, we propose a technical standard that applies to the MNP between 2G and 3G. We define network function, system function and information flow for MNP. We designed call processing mechanism for MNP by QoR. We also define the processing method of SMS according to the MNP.

  • PDF

A Research on Standard Profile for Improving Security of Information System (정보시스템 보안성 향상을 위한 표준프로파일에 관한 연구)

  • Ryu, Jung-Hee;Ryoo, In-Tae;Shin, Shin-Ae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1099-1102
    • /
    • 2002
  • 최근의 정보화 사업들은 인터넷 환경을 기반으로 하여, 웹 시스템으로 구축되고 있다. 그러나 웹 환경은 그 개방성으로 인하여 보안이 매우 취약하지만, 보안에 대한 체계적으로 정립된 보안모델이 없어 정보화사업마다 나름대로의 보안 모델을 만들어 적용하고 있다. 이렇게 자체적으로 정의한 보안모델은 구성 정도에 따가 취약성을 내포할 수 있으며, 일부 시스템 보안성에 문제가 발생하면 네트워크로 연결된 다른 시스템에도 문제가 전이치는 사례를 초래할 수 도 있다. 이러한 문제를 해결하기 위하여 부 연구에서는 정보화 사업들의 보안성 향상을 위하여 지켜야 하는 최소한의 보안 모델을 표준과 함께 제시하고자 한다.

  • PDF

Multiple Access Interference Cancellation for Synchronous DS/CDMA System (동기 DS/CDMA 시스템의 다원접속 간섭신호 제거에 관한 연구)

  • Lee, Young-Hwan;Cho, Pyung-Dong;Kim, Chol-Min;Yoon, Dong-Weon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1211-1214
    • /
    • 2000
  • 의사잡음(PN) 부호는 이상적인 자기상관특성을 갖지 못한다. 본 논문에서는 이상적인 자기상관 특성을 갖지 못하는 PN 부호에 대하여 이상적인 자기상관 특성을 가지도록 하여 동기 직접확산 부호분할 다원접속(DS/CDMA)시스템에서 부가적인 하드웨어 복잡성의 큰 증가 없이 간섭제거가 가능한 수신기 구조를 제안한다. PN 부호 오프셋을 사용하여 사용자 부호를 할당하고, 제안한 수신기 알고리즘을 PN 부호 오프셋을 사용한 시스템에 적용하여 다원접속 간섭 신호가 제거됨을 보이며 컴퓨터 모의실험을 통하여 이를 확인한다.

  • PDF

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20

  • Abdulla, Mouhamed;Shayan, Yousef R.
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.43-52
    • /
    • 2011
  • Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account the mobility factor of the reference node in addition to a number of interdependent requirements regarding the link direction, channel state, data rate and system factors; hence limiting its applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in this correspondence we analytically derived the greatest aggregate interference level tolerated for high-fidelity transmission tailored specifically for the MBWA standard. Our results, in the form of benchmark indicators, should be of particular interest to peers analyzing and researching RF coexistence scenarios with this new protocol.

Intelligent Multimedia Educational System on Distributed Environment (분산 환경에서의 지능형 멀티미디어 교육 시스템)

  • Lee, Se-Hun;Yun, Gyeong-Seop
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1323-1331
    • /
    • 1999
  • This paper suggests a multimedia educational system which has the ability to extract intelligent instruction on the distributed environment. The proposed system is designed for supporting individual instruction and real time user interaction. As the system based on CORBA, we put group managing module on it for multi user environment, so it has ability for distributed computing facilities. Using MHEG standard, we can provide multimedia courseware and real time user interaction. To diagnose students' responses and generate evaluations, we use several linguistic variables of fuzzy theory. There are two major advantages for using this system. This system can provide dynamic generation of problems and the ability to provide a dynamic instruction strategy. And it can increase reusability of courseware material for using standard of multimedia representation and communication. We use CORBA and MHEG to overcome the disadvantage of the Web, passive protocol and poor interactivity, HTTP.

  • PDF

Design and Implement of Self-Directed LMS for SCORM Standard Web-Base Content (SCORM 표준안에 적용된 Web-Base Content의 자기주도형 학습을 지원하기 위한 LMS 설계 및 구현)

  • Kim, Yun-Su;Kim, Seok-Soo;Lee, Jae-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.247-250
    • /
    • 2002
  • In this paper, We are design & implement to the LMS(Learning Management System) including SCORM standard for effective reusing and management of each digital contents. This system is composed XML based meta-data manager, SQL server and ASP for LMS application, which are the user directed teaming system within effective reusing and management of each digital contents.

  • PDF

A Survey on IEEE 802.11 MAC Analytical Modeling for MAC Performance Evaluation

  • Heo, Ung;Yu, Changfang;You, Kang-Soo;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.2
    • /
    • pp.119-127
    • /
    • 2011
  • The paper surveys various analytical models for IEEE 802.11 medium access control protocols and critically discusses recent issues developing in wireless mobile ad hoc networks and their MACs. The surveyed MAC protocols include the standard IEEE 802.11 MAC suites such as IEEE 802.11 DCF, IEEE 802.11 PCF, IEEE 802.11e EDCA, and IEEE 802.11 ad hoc mode; and also the newer, de facto MAC protocols. We study the analytic models of the standard MAC suites followed by the newer analytic models that have been published in recent years. Also, the paper tries to include most of current literatures discussing analytic modeling of MAC in conjunction to some critical issues such as contention among ad hoc nodes, hidden terminal problems, and real-time service support.

A Study on Traceability and visualization on Standard information of Project management deliverable (프로젝트 관리 산출물 기준 정보의 가시화와 추적성에 대한 연구)

  • Choi, ByungHan;Lee, SeoukJoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1088-1091
    • /
    • 2015
  • 프로젝트 수행에 우리는 괸리를 목적으로 다양한 산출물을 작성하고 생성한다. 미국 PMI의 PMBOK은 다양한 산출물을 표준화하고 있고 ISO21500 역시 다양한 종류의 산출물 생성을 표준화하고 있다. 그러나 산출물의 상세한 내용에 대해서는 PMBOK이나 ISO21500에서도 규정하지 않고 있다. 프로젝트 관리 산출물은 프로젝트 성공을 위한 산출물로 각종 관리계획, 중요 마일스톤 일정, 각종 이슈, 변경, 위기관련 다양한 지표 등을 중심으로 구성되어야 한다. 본 연구는 프로젝트 관리 산출물들에 프로젝트를 기준정보 6가지(Requirement, Work, Activity, Change, Issue, Risk)가 프로젝트 관리 산출물에 표기되어 추적기능을 가지고 있고 가시화를 할 수 있는지에 대하여 프로젝트 관리 산출물 template를 가지고 분석하였다. 이러한 분석 결과를 바탕으로 프로젝트 관리 산출물에 기준 정보를 추가하여 프로젝트 기준정보를 통합하고 가시화 하여 정보의 추적기능이 강화되기를 기대한다.

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

A Fast Rough Mode Decision Algorithm for HEVC

  • Yao, Wei-Xin;Yang, Dan;Lu, Gui-Fu;Wang, Jun
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.492-499
    • /
    • 2019
  • HEVC is the high efficiency video coding standard, which provides better coding efficiency contrasted with the other video coding standard. But at the same time the computational complexity increases drastically. Thirty-five kinds of intra-prediction modes are defined in HEVC, while 9 kinds of intra prediction modes are defined in H.264/AVC. This paper proposes a fast rough mode decision (RMD) algorithm which adopts the smoothness of the up-reference pixels and the left-reference pixels to decrease the computational complexity. The three step search method is implemented in RMD process. The experimental results compared with HM13.0 indicate that the proposed algorithm can save 39.7% of the encoding time, while Bjontegaard delta bitrate (BDBR) is increased slightly by 1.35% and Bjontegaard delta peak signal-to-noise ratio (BDPSNR) loss is negligible.