• Title/Summary/Keyword: information communication technology

Search Result 11,891, Processing Time 0.04 seconds

Trends Research and Development View of Power Line Communication (전력통신을 위한 시장 동향 및 발전 전망)

  • Kim, Ji-Ho;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.573-578
    • /
    • 2008
  • While going through economic development for several decades, Korea has become an industrialized country, and the development of industrial technology accelerated the advent of the information opportunity era. The recent information oriented society has brought forth the development of new information communication technology that enables anybody to obtain information easily and simply, and recently power line communication technology is being developed that allows the use of the existing power line net-works as they are. Each advanced country that faced up to a riffle effect of power line communication technology that enables us to obtain information easily anywhere at anytime is engaged in fierce competition to be a leader in this technology and to preoccupy the standardization of power line communication technology. At this point, this study is to help Korea take the lead in information communication technology by proposing a direction for the standardization that Korean power line communication technology needs to head for by identifying the trend of the worldwide of power line communication technology.

  • PDF

A PERFORMANCE STUDY OF SPEECH CODERS FOR TELEPHONE CONFERENCING IN DIGITAL MOBILE COMMUNICATION NETWORKS

  • Lee, M.S.;Lee, G.C.;Kim, K.C.;Lee, H.S.;Lyu, D.S.;Shin, D.J.;Lee, Hun
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.899-903
    • /
    • 1994
  • This paper describes two methods to assess the output speech, quality of vocoders for telephone conferencing in digital mobile communication networks. The proposed methods are the sentence discrimiantion method and the modified degraded mean opinion score (MDMOS) test. We apply these two methods to Qualcomm code excited linear prediction (QCELP), vector sum excited linear prediction (VSELP) and regular pulse excited-long term predictin (RPE-LTD) voceders to evaluate which vocoding algorithm can process mixed voice signal from two speakers better for telephone conferencing. From the experiments we obtain that the VSELP vocoding algorithm reveals superior output speech quality to the other two.

  • PDF

Information Security Strategy by Risk Factors based on Smart Railway Communications (스마트 철도 통신기반 위험요인에 따른 정보보호 방안)

  • Park, Eun-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.695-702
    • /
    • 2022
  • Smart railway system, which has been actively studied in recent years, is entering the intelligent stage beyond the automation stage based on ICT (Information & Communication Technology) such as communication technology and information technology. ICT technology used in smart railways is generally supported by various information protection technologies as it is vulnerable to information infringement. As a means of high-speed/mass transportation, it is essential to devise an information protection plan for ICT technology that forms the basis for smartening the railway system. Therefore, this paper presents the necessity of step-by-step information protection that measures for smart railway communication by examining potential risk factors of smart railway communication base and considering information protection factors that can respond to them.

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

Image Registration Improvement Based-on FFT Techniques with the Affine Transform Estimation

  • Wisetphanichkij, Sompong;Pasomkusolsil, Sanchaiya;Dejhan, Kobchai;Cheevasuvit, Fusak;Mitatha, Somsak;Sra-Ium, Napat;Vorrawat, Vinai;Pienvijarnpong, Chanchai
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.260-262
    • /
    • 2003
  • New Image registration techniques are developed for determining geometric distortions between two images of the same scene. First, the properties of the Fourier transform of a two dimensional function under the affine transformation are given. As a result, techniques for the estimation of the coefficients of the distortion model using the spectral frequency information are developed. Image registration can be achieved by applying the fast Fourier transform (FFT) technique for cross correlation of misregistered imagery to determine spatial distances. The correlation results may be rather broad, making detection of the peak difficult, what can be suppressed by enhancing cross-correlation technique. Yield greatly improves the delectability and high precision of image misregistration.

  • PDF

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

CONTINUOUS DIGIT RECOGNITION FOR A REAL-TIME VOICE DIALING SYSTEM USING DISCRETE HIDDEN MARKOV MODELS

  • Choi, S.H.;Hong, H.J.;Lee, S.W.;Kim, H.K.;Oh, K.C.;Kim, K.C.;Lee, H.S.
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.1027-1032
    • /
    • 1994
  • This paper introduces a interword modeling and a Viterbi search method for continuous speech recognition. We also describe a development of a real-time voice dialing system which can recognize around one hundred words and continuous digits in speaker independent mode. For continuous digit recognition, between-word units have been proposed to provide a more precise representation of word junctures. The best path in HMM is found by the Viterbi search algorithm, from which digit sequences are recognized. The simulation results show that a interword modeling using the context-dependent between-word units provide better recognition rates than a pause modeling using the context-independent pause unit. The voice dialing system is implemented on a DSP board with a telephone interface plugged in an IBM PC AT/486.

  • PDF

A 60GHz Wireless Cooperative Communication System Based on Switching Beamforming

  • Shi, Wei;Wang, Jingjing;Liu, Yun;Niu, Qiuna;Zhang, Hao;Wu, Chunlei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1590-1610
    • /
    • 2016
  • The challenge of penetrating obstacles along with impact from weak multipath effects makes 60GHz signal very difficult to be transmitted in non-line of sight (NLOS) channel. So 60GHz system is vulnerable to obstructions and thus likely results in link interruption. While the application of cooperative technology to solve link blockage problemin 60GHz system should consider the characteristic of directional transmission for 60GHz signal. Therefore in this paper a system is proposed to solve the link blockage problem in 60GHz NLOS communication environment based on the concept of cooperation and also the beamforming technology, which is the basis of directional transmission for 60GHz communication system. The process of anti-blockage solution with cooperative communication is presented in detail, and the fast switching and recovery schemes are well designed. The theoretical values of symbol error rate (SER) using decode and forward (DF) cooperation and amplify and forward (AF) cooperation are presented respectively when the common channel interference exists. Simulation results demonstrate that the performance based on DF cooperation is better than the performance based on AF cooperation when directional transmission is used.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Surface Centroid TOA Location Algorithm for VLC System

  • Zhang, Yuexia;Chen, Hang;Chen, Shuang;Jin, Jiacheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.277-290
    • /
    • 2019
  • The demand for indoor positioning is increasing day by day. However, the widely used positioning methods today cannot satisfy the requirements of the indoor environment in terms of the positioning accuracy and deployment cost. In the existing research domain, the localization algorithm based on three-dimensional space is less accurate, and its robustness is not high. Visible light communication technology (VLC) combines lighting and positioning to reduce the cost of equipment deployment and improve the positioning accuracy. Further, it has become a popular research topic for telecommunication and positioning in the indoor environment. This paper proposes a surface centroid TOA localization algorithm based on the VLC system. The algorithm uses the multiple solutions estimated by the trilateration method to form the intersecting planes of the spheres. Then, it centers the centroid of the surface area as the position of the unknown node. Simulation results show that compared with the traditional TOA positioning algorithm, the average positioning error of the surface centroid TOA algorithm is reduced by 0.3243 cm and the positioning accuracy is improved by 45%. Therefore, the proposed algorithm has better positioning accuracy than the traditional TOA positioning algorithm, and has certain application value.