• Title/Summary/Keyword: channel list

Search Result 48, Processing Time 0.031 seconds

Mailing List Characteristic from Electronic Mail

  • Khaitiyakun, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.917-921
    • /
    • 2004
  • Principle of mailing list was distributed messages to all subscribers in one time. But mailing list operation has constructed a network traffic problem. Because mailing list manager distributed mails without concentrate on subscriber network. If our network has many of subscribers, there will be redundant data in traffic channel. Submailing list has purpose to reduce problems. Analyses of mailing list characteristic in electronic mail were a feature of submailing list system, which manage by human hand (Network Administrator). That will cause trouble for network traffic if Network Administrator could not seek for mailing list characteristic from e-mails in due time. This article will present ideas and recognize methodology for automatic working in submailing list system. Recognize step begin with capture process, which use to trap e-mail information from transfer channel. Next process is preparing raw data into recognition format. Then the third one is recognize part and find out confidential factor. The last process is make decision and determine which electronic mail has properties of mailing list characteristic. Afterward deliver result to submailing list for carry on.

  • PDF

An efficient channel searching method based on channel list for independent type cognitive radio systems (독립형 무선 인지 시스템에서 채널 목록 기반의 효과적 채널 검색)

  • Lee, Young-Doo;Koo, In-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1422-1428
    • /
    • 2009
  • In this paper, we consider an independent type cognitive radio system where secondary users can utilize empty channels that are not currently used by primary users having the license to these channels. In the previous works, secondary users search channels sequently or randomly to detect activities of primary user on channels. These channel searching methods however are not suitable to the characteristics of the wireless environment. Therefore, we propose a channel searching method based on the channel list for the purpose of reducing the channel searching time and improving the throughput of secondary users. In the proposed method, we firstly determine weighting value of each channel based on the history of channel activities of primary users and add the weighing value to current channel state buffer. And then, we search an empty channel from channel with smallest value to one with the biggest value. Finally, we compare the performances of the proposed method with those of the sequential channel searching and the random channel searching methods in terms of average channel searching time and average number of transmissions of secondary user.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

Cognitive radio system based on channel list for efficient channel searching (효과적 채널 검색을 위한 채널 목록 기반 무선 인지 시스템)

  • Lee, Young-Du;Koo, In-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.284-286
    • /
    • 2009
  • In this paper, we consider a cognitive radio system operating as secondary user. It uses an empty channel that is not currently used by primary users having the license to the channel. In the previous works, secondary user looks for an empty channel by choosing any channel in order or randomly and by sensing the channel to distinguish whether primary users are using. But if primary user is fixed type, we will find an empty channel faster than the mentioned channel selecting methods by using a method considering prior information about cases that primary user used the channel, since it is possible to analogize the channel access possibility of primary user according to regular time and position. Therefore, we propose a channel searching method based on the channel list for the purpose of reducing the channel searching time and improving throughput of secondary users. Firstly, we determine a weighting value of each channel based on the history of channel activities of primary users. This value is added to current channel state buffer and we search an empty channel from channel with smallest value to one with the biggest value. Finally, we compare the performances of the proposed method with those of the sequential channel searching and the random channel searching methods in terms of the average channel searching time and the average number of transmissions of secondary user.

  • PDF

Implementation of CEI frequency operation function in IMDC for FA-50 aircraft

  • You, Eun-Kyung;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.1-7
    • /
    • 2018
  • The Korean Air Force FA-50 aircraft currently operating in the Air Force is using Ultra High Frequency (UHF) frequency communications for navigation communications with ground control stations or other aircraft. The pilot communicates by changing frequency at any time during flight, and performs communication by directly inputting from the Integrated Up-Front Controller installed in the cockpit. The frequency is designated as secret, and the pilot receives the task with the frequency channel number (001~xxx) and finds the frequency of the channel in the list of 4,000 frequency channels and inputs it manually. This reduces the safety and convenience of pilots' operations and exposes them to hazards that may occur especially during night flight missions. In this paper, we propose a function to embed the frequency corresponding to the frequency channel list in IMDC, the aircraft mission computer, and to automatically change the frequency when the pilot only inputs the channel number.

A Dualistic Channel List Management Technique for Efficient Channel Navigation in IPTVs (효율적인 IPTV 채널 탐색을 위한 이분화된 채널 리스트 관리 기술)

  • Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.21-26
    • /
    • 2016
  • With the increased desire of TV consumers for interactivity and personalization, IPTV has been rapidly spread in recent years. IPTV can provide a variety of services through hundreds of channels, but the explosion of TV channels makes users even more difficult to find their desired contents. In addition, the channel zapping delay of IPTV is serious due to the limited network bandwidth. To resolve these problems, this paper distinguishes hot and cold channels by exploiting the real-time viewing rate as well as each user's viewing history, and then, maintains hot channels in the hot list, which is searched first during channel navigation and also prefetched to support the preview of channels. Experimental results show that the proposed scheme improves the IPTV channel seek time significantly compared to existing channel seeking interfaces.

Performance of Successive-Cancellation List Decoding of Extended-Minimum Distance Polar Codes (최소거리가 확장된 극 부호의 연속 제거 리스트 복호 성능)

  • Ryu, Daehyeon;Kim, Jae Yoel;Kim, Jong-Hwan;Kim, Sang-Hyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.109-117
    • /
    • 2013
  • Polar codes are the first provable error correcting code achieving the symmetric channel capacity in a wide case of binary input discrete memoryless channel(BI-DMC). However, finite length polar codes have an error floor problem with successive-cancellation list(SCL) decoder. From previous works, we can solve this problem by concatenating CRC(Cyclic Redundancy Check) codes. In this paper we propose to make polar codes having extended-minimum distance from original polar codes without outer codes using correlation with generate matrix of polar codes and that of RM(Reed-Muller) codes. And we compare performance of proposed polar codes with that of polar codes concatenating CRC codes.

ML Symbol Detection for MIMO Systems in the Presence of Channel Estimation Errors

  • Yoo, Namsik;Back, Jong-Hyen;Choi, Hyeon-Yeong;Lee, Kyungchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5305-5321
    • /
    • 2016
  • In wireless communication, the multiple-input multiple-output (MIMO) system is a well-known approach to improve the reliability as well as the data rate. In MIMO systems, channel state information (CSI) is typically required at the receiver to detect transmitted signals; however, in practical systems, the CSI is imperfect and contains errors, which affect the overall system performance. In this paper, we propose a novel maximum likelihood (ML) scheme for MIMO systems that is robust to the CSI errors. We apply an optimization method to estimate an instantaneous covariance matrix of the CSI errors in order to improve the detection performance. Furthermore, we propose the employment of the list sphere decoding (LSD) scheme to reduce the computational complexity, which is capable of efficiently finding a reduced set of the candidate symbol vectors for the computation of the covariance matrix of the CSI errors. An iterative detection scheme is also proposed to further improve the detection performance.

A Low Complexity Candidate List Generation for MIMO Iterative Receiver via Hierarchically Modulated Property (MIMO Iterative 수신기에서 계층적 변조 특성을 이용한 낮은 복잡도를 가지는 후보 리스트 발생 기법)

  • Jeon, Eun-Sung;Yang, Jang-Hoon;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.500-505
    • /
    • 2009
  • In this paper, We present a low complexity candidate list generation scheme in iterative MIMO receiver. Since QAM modulation can be decomposed into HP symbols and LP symbol and HP symbol is robust in error capability, we generate HP symbol list with simple ZF detector output and its corresponding neighbor HP symbols, Then, based on HP symbol list, the LP symbol list is generated by using the sphere decoder. From the second iteration, since apriori value from channel decoder is available, the candidate list is updated based on demodulated apriori value. Through the simulation, we observe that at the first iteration, the BER performance is worse than LSD. However, as the number of iteration is increased, the proposed scheme has almost same performance as LSD. Moreover, the proposed one has reduced candidate list generation time and lower number of candidate list compared with LSD.

A channel Routing System using CMOS Standard Cell Library (CMOS 표준 Cell Library를 이용하는 수평 트랙 배선 시스템)

  • 정태성;경종민
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.1
    • /
    • pp.68-74
    • /
    • 1985
  • In this Paper, we present a non-doglegging channel routing system for If layout using standard cells. This system produces a final two-layer wiring pattern in the horizontal track between two rows, each of which is a linear placement of standard cells of identical heights, satisfying the given net list specification. The layout of CMOS cell library Including nine primitive cells used in this paper is represented in CIF (Caltech Intermediate Form) using λ(Lambda) of 2 microns in Mead-Conway layout representation scheme. The cell dimension and 1/0 characteristics such as name, position and layer type of the pins are stored in Component Library to be used in the channel routing progranl, CROUT. 4 subprogram, NET-PLOT, was used to report a schemdtic layout result, and another subprogram, NETCIF was used to with a full-fledged final layout representation in GIF, A test run for realizing a dynamicmaster-slave D flip-flop with set/reset using primitive cells was shown to take 4 CPU seconds on VAX 11/780.

  • PDF