• Title/Summary/Keyword: Wireless Distribution System

Search Result 285, Processing Time 0.021 seconds

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

Analysis of Near Field for Base Station Panel Antenna(4 X 2 Dipole Array) (기지국용 판넬 안테나(4 X 2 Dipole Array)의 근역장 분석)

  • Lee, Dugro;Park, Ju-Derk;Choi, Jae-Ic;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.473-479
    • /
    • 2004
  • In this paper, power density in near field is calculated about analytic object which has comparatively large volume in considering used wavelength such as cellular base station antenna. Panel sector antenna which is used widespreadly in domestic cellular wireless communication system is modeled and electromagnetic field distribution in reactive near field region is calculated by FDTD (Finite Difference Time Domain) method. After that, antenna gain in far field region is obtain by near to far transformation. Power spectral density in radiated near field is calculated in applying to gain-based model with antenna gain in far field. Finally, compliance distance is obtained in considering the result from radiated near field calculation and basic restrictions on occupational and general public exposure limits in ICNIRP guideline. In the center of main radiating position, the result from gain-based model is -14.55 ㏈m and the result from surface scanning method is -15.75 ㏈m. When the losses from cables and connectors used in measurement are considered, the results from gain-based model and surface scanning method are nearly coincident.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

The Analysis of Estrus Behavior and the Evaluation of Conditions Required for Improving Reproductive Efficiency in Holstein Dairy Cows using a Heat Detector (발정탐색기를 이용한 Holstein 젖소의 발정행동 분석 및 번식효율 향상을 위한 조건의 평가)

  • Baek, Kwang-Soo;Lee, Wang-Shik;Son, Jun-Kyu;Lim, Hyun-Joo;Yoon, Ho-Beak;Kim, Tae-Il;Hur, Tai-Young;Choe, Chang-Yong;Jung, Young-Hun;Kwon, Eung-Gi;Jung, Yeon-Sub;Kim, Sun-Kyu;Won, Jeong-Il
    • Journal of Embryo Transfer
    • /
    • v.28 no.3
    • /
    • pp.177-184
    • /
    • 2013
  • The objective of this study was to analyze the accuracy of estrus detection of heat detector and analysis of estrus behavior (mounting and mounted), and the evaluation of conditions required for improving reproductive efficiency in Holstein dairy cows fitted with a estrous detector. The heat detection system consists of estrous detector based on wireless sensor and an electric bulletin board displayed estrus behavior data. When cow mounting other cows, the accuracy of estrus behavior displayed an electric bulletin board were 87.5% (mounting other cows only), 100% (mounting other cows but not standing), 80.0% (mounting other cows with standing for 1~4 seconds), 90.0% (mounting other cows but not standing for 1~4 seconds), 80% (mounting other cows with standing for more than 5 seconds) and 90.0% (mounting other cows but not standing for more than 5 seconds). When cow mounted other cows, the accuracy of estrus behavior displayed an electric bulletin board were 100% (mounted other cows but not standing), 100% (mounted other cows with standing for 1~4 seconds), 100% (mounted other cows but not standing for 1~4 seconds) and 100% (mounted other cows with standing for more than 5 seconds). Circadian distribution of first observed in estrus were 59.1% (am 8~pm 6) and 40.9% (pm 6~am 8). Distribution for the number of estrus behavior were 40.9% (less than 3 times), 36.4% (4~6 times) and 22.7% (more than 4 times). The conception rates relative to interval from first estrus behavior to insemination for estrus periods were 23.1% (less than 11 hours) and 55.6% (12~20 hours).

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF