• Title/Summary/Keyword: transmission map

Search Result 258, Processing Time 0.024 seconds

Flashover Prediction of Polymeric Insulators Using PD Signal Time-Frequency Analysis and BPA Neural Network Technique

  • Narayanan, V. Jayaprakash;Karthik, B.;Chandrasekar, S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1375-1384
    • /
    • 2014
  • Flashover of power transmission line insulators is a major threat to the reliable operation of power system. This paper deals with the flashover prediction of polymeric insulators used in power transmission line applications using the novel condition monitoring technique developed by PD signal time-frequency map and neural network technique. Laboratory experiments on polymeric insulators were carried out as per IEC 60507 under AC voltage, at different humidity and contamination levels using NaCl as a contaminant. Partial discharge signals were acquired using advanced ultra wide band detection system. Salient features from the Time-Frequency map and PRPD pattern at different pollution levels were extracted. The flashover prediction of polymeric insulators was automated using artificial neural network (ANN) with back propagation algorithm (BPA). From the results, it can be speculated that PD signal feature extraction along with back propagation classification is a well suited technique to predict flashover of polymeric insulators.

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Dispersion-Managed Link Configured with Repetitively Shaped Dispersion Maps and Embedded with Mid-span Spectral Inversion

  • Chung, Jae-Pil;Lee, Seong-Real
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.235-241
    • /
    • 2022
  • A dispersion map was proposed to improve the compensation effect of a distorted WDM (wavelength division multiplexed) channel in a dispersion-managed link coupled with optical phase conjugation. The dispersion map is an origin-symmetric structure around the optical phase conjugator in the middle of the transmission path. In addition, the dispersion map has a form in which a constant dispersion accumulation pattern is repeated regularly. Through simulation, we confirmed that the application of the origin-symmetric dispersion map with a repetitively shaped configuration was more effective in compensating for the distorted WDM channel than in the dispersion-managed link with a conventional dispersion map. In addition, we confirmed that the compensation effect could be increased when the cumulative dispersion distribution of the origin-symmetric distribution map had a positive value in the first half section and a negative value in the second half section. Further, we observed that as the number of repeated dispersion accumulation patterns increased, the residual dispersion per span should also be increased.

Compensation for the Distorted WDM Signals through Dispersion Map of Trapezoid-Based Symmetry Configuration Combined with MSSI (MSSI와 결합된 사다리꼴 기반 대칭 구조의 분산 맵을 통한 WDM 신호의 왜곡 보상)

  • Seong-Real Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.4
    • /
    • pp.552-558
    • /
    • 2024
  • In dispersion management, which involves additionally inserting a dispersion compensation fiber of an appropriate length to eliminate or reduce the chromatic dispersion of a single-mode fiber, determining the form of the dispersion map, which is the cumulative dispersion profile according to the transmission distance, is the most basic and important. In this paper, the various symmetric dispersion map based on trapezoids applied to dispersion-managed links combined with mid-span spectral inversion (MSSI), which compensates for the distortion caused by Kerr nonlinear effects through optical phase conjugation in the middle of the entire transmission link are proposed, and the effect of each dispersion map on distortion compensation of wavelength division multiplexed (WDM) signals is analyzed. Although the degree of compensation varies depending on the factors that determine the detailed shape of the proposed trapezoid-shaped dispersion map and RDPS (residual dispersion per span), overall, it was confirmed that distortion compensation for signals with a small extinction ratio was more effective than distortion compensation for WDM channel signals with a large extinction ratio.

A Study for Improvement Performance on Using Exponentially Weighted Moving Average at IPv6 networks (IPv6 네트웍 환경에서 지수가중적 이동평균 기법을 이용한 성능향상에 관한 연구)

  • Oh, Ji-Hyun;Jeong, Choong-Kyo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.323-326
    • /
    • 2007
  • Mobility Anchor Points are used for the mobility management in HMIPv6 networks. Currently a mobile node selects the MAP farthest away from itself as a new MAP among available candidates when it undertakes a macro handoff. With this technique, however, the traffic tends to be concentrated at a MAP with the largest domain size and the communication cost increases due to the distance between the mobile node and the MAP. In this work, we proposed a cost effective MAP selection scheme. When leaving the current MAP domain. the mobile node calculates the optimum MAP domain size to minimize the local mobility cost at the new MAP domain considering mobile node's velocity and packet transmission rate. The mobile node then selects a MAP domain of size close to the optimum domain size calculated among the candidate MAP domains. In this way, it is possible for the mobile node to select an optimal MAP adaptively taking the network and node states into account, thus reducing the communication cost.

  • PDF

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

The Effects of Image Dehazing Methods Using Dehazing Contrast-Enhancement Filters on Image Compression

  • Wang, Liping;Zhou, Xiao;Wang, Chengyou;Li, Weizhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3245-3271
    • /
    • 2016
  • To obtain well-dehazed images at the receiver while sustaining low bit rates in the transmission pipeline, this paper investigates the effects of image dehazing methods using dehazing contrast-enhancement filters on image compression for surveillance systems. At first, this paper proposes a novel image dehazing method by using a new method of calculating the transmission function—namely, the direct denoising method. Next, we deduce the dehazing effects of the direct denoising method and image dehazing method based on dark channel prior (DCP) on image compression in terms of ringing artifacts and blocking artifacts. It can be concluded that the direct denoising method performs better than the DCP method for decompressed (reconstructed) images. We also improve the direct denoising method to obtain more desirable dehazed images with higher contrast, using the saliency map as the guidance image to modify the transmission function. Finally, we adjust the parameters of dehazing contrast-enhancement filters to obtain a corresponding composite peak signal-to-noise ratio (CPSNR) and blind image quality assessment (BIQA) of the decompressed images. Experimental results show that different filters have different effects on image compression. Moreover, our proposed dehazing method can strike a balance between image dehazing and image compression.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.