• Title/Summary/Keyword: Voice Network

Search Result 758, Processing Time 0.029 seconds

Performance Evaluation of Priority Scheme of DMSA Protocol for Multimedia Traffic (멀티미디어 트래픽에 대한 DMSA 프로토콜의 성능평가)

  • Ju, Gi-Ho;An, Seong-Ok
    • The Journal of Engineering Research
    • /
    • v.1 no.1
    • /
    • pp.41-48
    • /
    • 1997
  • In this paper, we wxtend DMSA system to support multimedia traffic more efficiently by incorporating a priority scheme. we divide network stations into two types: asynchronous and isosynchronous stations, and we give a priority to the isosynchronous stations over the asynchronous stations by imposing a time-out constraint on the asynchronous stations . we derive the maximum number of isosynchronous stations the proposed priority scheme can support simultaneously and the maximum bandwidth that can be utilized by asynchronous stations in the presence of isosynchronous traffic. We also provide simulation results for the mixed voice and data traffic, and compare them to the analytic results.

  • PDF

Issues and Roles of the Transportation Technology under the Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 교통기술의 이슈와 역할)

  • Lee, Chungwon;Byun, Wanhee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.2D
    • /
    • pp.259-263
    • /
    • 2006
  • As the concept of Ubiquitous Computing has become an important issue, we need to have a voice in the field of Transportation. Ubiquitous Computing means that IT network based on realization of 5 Any(Anytime, Anywhere, Anything, Anynetwork, Anydevice) is deeply penetrated into our daily life. As ITS has developed with the aid of IT and Transportation Technology together, we need to discuss u-Transportation concept with Ubiquitous Computing and Transportation Technology. According to the recent papers and studies, Transportation or Transportation Information sector is mentioned as a major application of Ubiquitous Computing. However, most of the studies are limited to the basic concept without any in-depth understanding about Transportation. This paper present the implementation of u-Transportation and the role of Transportation Technology based on recent technology trend.

Verification System Using NFT to Prevent Profile Impersonation Crime (프로필 사칭 범죄를 방지하기 위해 NFT를 이용한 검증 시스템)

  • Kim, Ho-Yoon;Lee, Won-Seok;Shin, Seung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.354-356
    • /
    • 2022
  • Profiles are the most basic means of representing who you are, and you represent yourself. In SNS and chatting apps that use profiles the most, profiles are used to express their experiences, moods, and thoughts. However, in voice phishing, impersonation crimes, etc., they steal and impersonate a photo such as a profile, and then deceive the victim into committing a crime. In this paper, to prevent the crime of impersonation, the authenticity of the original is determined using NFT that can distinguish the original. Minting the original profile picture with NFT, registering it on the blockchain network, and storing the original file in off-chain IPFS. This is expected to be effective in preventing impersonation crimes because it is possible to easily determine the authenticity of the profile picture.

  • PDF

Transition of Service Paradigm from Service Recovery to Proactive Service (사후 서비스에서 선제적 서비스로 서비스 패러다임의 전환)

  • Rhee, Hyunjung;Kim, Hyangmi;Rhee, Chang Seop
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.396-405
    • /
    • 2020
  • In this study, we used the big data of Voice of Customer (VOC) related to high-speed Internet products to look at the causes of perceived quality and the possibility of proactive service. In order to verify the possibility of proactive service, we collected VOC data from 13 facilities and equipment of a mobile communication service company, and then conducted 𝒙2 test to verify that there was a statistically significant difference between the actual VOC observation values and expected values. We found statistical evidence that proactive service is possible through real-time monitoring for the six disability alarms among the 13 facilities and equipment, which are FTTH-R Equipment ON/OFF, FTTH-EV Line Error Detection, Port Faulty, FTTH-R Line Error Detection, Network Loop Detection, and Abnormal Limiting Traffic. Companies are able to adopt the proactive service to improve their market share and to reduce customer service costs. The results of this study are expected to contribute to the actual application of industry in that it has diagnosed the possibility of proactive service in the telecommunication service sector and further suggested suggestions on how to provide effective proactive service.

A Study on Time Conviction Based on PKI for Suitable IMT-2000 Service (IMT-2000 서비스에 적합한 PKI 기반 시점확인 서비스에 관한 연구)

  • 이덕규;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.211-222
    • /
    • 2004
  • By development of wireless mobile communication, many users increased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that wireless network is much unlawful stealing use and tapping etc. As is different from this, problem can happen in service side. Can take next time for these example. By user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in IMT-2000 to develop hereafter. Way to propose proposed efficient way using individual in IMT-2000 just as it is.

  • PDF

A Fault Tolerant ATM Switch using a Fully Adaptive Self-routing Algorithm - The Cyclic Banyan Network (실내 무선 통신로에서 파일럿 심볼을 삽입한 Concatenated FEC 부호에 의한 WATM의 성능 개선)

  • 박기식;강영흥;김종원;정해원;양해권;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1276-1284
    • /
    • 1999
  • We have evaluated the BER's and CLP's of Wireless ATM (WATM) cells employing the concatenated FEC code with pilot symbols for fading compensation through the simulation in indoor wireless channel modeled as a Rayleigh and a Rician fading channel, respectively. The results of the performance evaluation are compared with those obtained by employing the convolutional code in the same condition. In Rayleigh fading channel, considering the maximum tolerance BER ( $10^-3$) as a criterion of the voice service, it is blown that the performance improvement of about 4 dB is obtained in terms of $E_b/N_o$ by employing the concatenated FEC code with pilot symbols rather than the convolutional code with pilot symbols.When the values of K parameter which means the ratio of the direct signal to scattered signal power in Rician fading channel are 6 and 10, it is shown that the performance improvement of about 4 dB and 2 dB is obtained, respectively, in terms of $E_b/N_o$ by employing the concatenated FEC code with pilot symbols considering the maximum tolerance BER of the voice service. Also in Rician fading channel of K=6 and K= 10, considering CLP = $10^-3$ as a criterion, it is observed that the performance improvement of about 3.5 dB and1.5 dB is obtained, respectively, in terms of $E_b/N_o$ by employing the concatenated FEC code with pilot symbols.

  • PDF

A Study on the Development Plan to Increase Supplement of Voice over Internet Protocol (인터넷전화의 보급 확산을 위한 발전방안에 관한 연구)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.28 no.3
    • /
    • pp.191-210
    • /
    • 2009
  • Internet was first designed only for sending data, but as the time passed, internet started to evolve into a broadband multi-media web that is capable of transmitting sound, video, high-capacity data and more due to the demands of internet users and the rapid changing internet-communication technology. Domestically, in January, 2000 Saerom C&T, launched a free VoIP, but due to limited ways of conversation(PC to PC) and absence of a revenue model, and bad speech quality, it had hit it's growth limit. This research studied VoIP based on technological enhancement in super-speed internet. According to IDC, domestic internet market's size was 80,800 million in 2008, and it formed a percentage of 12.5% out of the whole sound-communication market. in case of VoIP, it is able to maximize it's profit by connecting cable and wireless network, also it has a chance of becoming firm-concentrated monopoly market by fusing with IPTV. Considering the fact that our country is insignificant in MVNO revitalization, regulating organizations will play a significant roll on regulating profit between large and small businesses. Further research should be done to give VoIP a secure footing to prosper and become popularized.

  • PDF

A study on combination of loss functions for effective mask-based speech enhancement in noisy environments (잡음 환경에 효과적인 마스크 기반 음성 향상을 위한 손실함수 조합에 관한 연구)

  • Jung, Jaehee;Kim, Wooil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.3
    • /
    • pp.234-240
    • /
    • 2021
  • In this paper, the mask-based speech enhancement is improved for effective speech recognition in noise environments. In the mask-based speech enhancement, enhanced spectrum is obtained by multiplying the noisy speech spectrum by the mask. The VoiceFilter (VF) model is used as the mask estimation, and the Spectrogram Inpainting (SI) technique is used to remove residual noise of enhanced spectrum. In this paper, we propose a combined loss to further improve speech enhancement. In order to effectively remove the residual noise in the speech, the positive part of the Triplet loss is used with the component loss. For the experiment TIMIT database is re-constructed using NOISEX92 noise and background music samples with various Signal to Noise Ratio (SNR) conditions. Source to Distortion Ratio (SDR), Perceptual Evaluation of Speech Quality (PESQ), and Short-Time Objective Intelligibility (STOI) are used as the metrics of performance evaluation. When the VF was trained with the mean squared error and the SI model was trained with the combined loss, SDR, PESQ, and STOI were improved by 0.5, 0.06, and 0.002 respectively compared to the system trained only with the mean squared error.

Coverage Analysis of VHF Aviation Communication Network for Initial UAM Operations Considering Real Terrain Environments (실제 지형 환경을 고려한 초기 UAM 운용을 위한 VHF 항공통신 커버리지 분석)

  • Seul-Ae Gwon;Seung-Kyu Han;Young-Ho Jung
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.102-108
    • /
    • 2024
  • In the initial stages of urban air mobility (UAM) operations, compliance with existing visual flight rules and instrument flight regulations for conventional human-crewed aircraft is crucial. Additionally, voice communication between the on board pilot and relevant UAM stakeholders, including vertiports, is essential. Consequently, very high frequency (VHF) aviation voice communication must be consistently provided throughout all phases of UAM operations. This paper presents the results of the VHF communication coverage analysis for the initial UAM demonstration areas, encompassing the Hangang River and Incheon Ara-Canal corridors, as well as potential vertiport candidate locations. By considering the influence of terrain and buildings through the utilization of a digital surface model (DSM), communication quality prediction results are obtained for the analysis areas. The three-dimensional coverage analysis results indicate that stable coverage can be achieved within altitude corridors ranging from 300 m to 600 m. However, there are shaded areas in the low-altitude vertiport regions due to the impact of high-rise buildings. Therefore, additional research to ensure stable coverage around vertiports in the lower altitude areas is required.

Resource Allocation Information Sorting Algorithm Variable Selection Scheme for MF-TDMA DAMA Satellite Communication System (MF-TDMA DAMA 위성통신 시스템에서의 자원할당정보 정렬 알고리즘 가변 선택기법 연구)

  • Park, Nam Hyoung;Han, Joo-Hee;Han, Ki Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • In modern society, as technology has advanced and human life area has expanded, there has been an increasing demand for high-quality voice and video communications services without restrictions on time and place. In response to this demand, satellite communications systems that provide a wide range of communications and that offer multiple access are evolving day by day. In satellite communications systems such as Digital Video Broadcasting - Return Channel Via Satellite (DVB-RCS) and Warfighter Information Network-Tactical (WIN-T), the multi-frequency time division multiple access (MF-TDMA) demand assigned multiple access (DAMA) scheme is used for efficient resource allocation. In this scheme, since the satellite terminals periodically request resources from the network controller, and the network controller dynamically allocates resources, it is necessary to arrange resource allocation information from time to time. Shortening of the alignment time is a more important factor in a satellite communications system in which a long transmission delay occurs due to long-distance transmission and reception. In this paper, we propose a sorting algorithm variable-selection scheme that shortens the sorting time by cross-selecting the sorting algorithm based on a threshold value, while setting the number of frames in the MF-TDMA DAMA satellite communications system as the threshold value.