• Title/Summary/Keyword: transmission technique

Search Result 2,175, Processing Time 0.029 seconds

Development of Nondestructive Sorting Method for Brown Bloody Eggs Using VIS/NIR Spectroscopy (가시광 및 근적외선 전투과 스펙트럼을 이용한 갈색 혈란 비파괴선별 방법 개발)

  • Lee, Hong-Seock;Kim, Dae-Yong;Kandpal, Lalit Mohan;Lee, Sang-Dae;Mo, Changyeun;Hong, Soon-Jung;Cho, Byoung-Kwan
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.1
    • /
    • pp.31-37
    • /
    • 2014
  • The aim of this study was the non-destructive evaluation of bloody eggs using VIS/NIR spectroscopy. The bloody egg samples used to develop the sorting mode were produced by injecting chicken blood into the edges of egg yolks. Blood amounts of 0.1, 0.7, 0.04, and 0.01 mL were used for the bloody egg samples. The wavelength range for the VIS/NIR spectroscopy was 471 to 1154 nm, and the spectral resolution was 1.5nm. For the measurement system, the position of the light source was set to $30^{\circ}$, and the distance between the light source and samples was set to 100 mm. The minimum exposure time of the light source was set to 30 ms to ensure the fast sorting of bloody eggs and prevent heating damage of the egg samples. Partial least squares-discriminant analysis (PLS-DA) was used for the spectral data obtained from VIS/NIR spectroscopy. The classification accuracies of the sorting models developed with blood samples of 0.1, 0.07, 0.04, and 0.01 mL were 97.9%, 98.9%, 94.8%, and 86.45%, respectively. In this study, a novel nondestructive sorting technique was developed to detect bloody brown eggs using spectral data obtained from VIS/NIR spectroscopy.

PVD Image Steganography with Locally-fixed Number of Embedding Bits (지역적 삽입 비트를 고정시킨 PVD 영상 스테가노그래피)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.3
    • /
    • pp.350-365
    • /
    • 2017
  • Steganography is a technique for secret data communication, which is not perceived by third person between a receiver and a transmitter. It has been developed for thousands of years for the transmission of military, diplomatic or business information. The development of digital media and communication has led to the development of steganography techniques in modern times. Technic of image steganography include the LSB, which fixes the number of embedded bits into a pixel, and PVD, which exploits the difference value in the neighboring pixel pairs. In the case of PVD image steganography, a large amount of information is embedded fluidly by difference value in neighboring pixel pairs and the designed range table. However, since the secret information in order is embedded, if an error of the number of embedded bits occurs in a certain pixel pair, all subsequent information will be destroyed. In this paper, we proposes the method, which improve the vulnerability of PVD property about external attack or various noise and extract secret information. Experimental process is comparison analysis about stego-image, which embedded various noise. PVD shows that it is not possible to preserve secret information at all about noise, but it was possible to robustly extract secret information for partial noise of stego-image in case of the proposed PVD image steganography with locally-fixed number of embedding bits.

A Utility-Based Hybrid Error Recovery Scheme for Multimedia Transmission over 3G Cellular Broadcast Networks (3G 방송망에서의 효율적인 멀티미디어 전송을 위한 유틸리티 기반 하이브라드 에러 복구기법)

  • Kang Kyung-Tae;Cho Yong-Jin;Cho Yong-Woo;Cho Jin-Sung;Shin Heon-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.333-342
    • /
    • 2006
  • The cdma2000 lxEV - DO mobile communication system provides broadcast and multicast services (BCMCS) to meet an increasing demand from multimedia data services. The servicing of video streams over a BCMCS network must, however, face a challenge from the unreliable and error-prone nature of the radio channel. The BCMCS network uses Reed-Solomon coding integrated with the MAC protocol for error recovery. We analyze this coding technique and show that it is not effective in the case of slowly moving mobiles. To improve the playback quality of an MPEG-4 FGS video stream, we propose the Hybrid error recovery scheme, which combines Reed-Solomon with ARQ, using slots which are saved by reducing the Reed-Solomon coding overhead. The target packets to be retransmitted are prioritized by a utility function to reduce the packet error rate in the application layer within a fixed retransmission budget. This is achieved by considering of the map of the error control block at each mobile node. The proposed Hybrid error recovery scheme also uses the characteristics of MPEG-4 FGS (fine granularity scalability) to improve the video quality even when conditions are adverse: slow-moving nodes and a high error rate in the physical channel.

Dummy Sequence Insertion for PAPR Reduction of OFDM Communication System (OFDM 통신시스템의 PAPR 저감을 위한 더미 시퀀스 삽입)

  • 이재은;유흥균;정영호;함영권
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.12
    • /
    • pp.1239-1247
    • /
    • 2003
  • OFDM(orthogonal frequency division multiplexing) communications system is very attractive for the high data rate transmission in the frequency selective lading channel. Since OFDM has high PAPR(peak-to-average power ratio), OFDM signal may be distorted by the nonlinear HPA(high power amplifier). In this paper, we propose the DSI(dummy sequence insertion) method for OFDM communication system. Some sub-carriers are inserted for PAPR reduction. They carry the specified dummy data sequence which are used for only PAPR reduction and do not work as side information like the conventional PTS(partial transmit sequence) or SLM(selected mapping) method. We use the complementary sequence and the combination of the correlation sequence as the dummy sequence. Flipping technique is used for the DSI method to get the effective PAPR reduction. It is important that BER of the proposed method is independent of the damage of the dummy data sequence. And DSI method has better spectral efficiency than the conventional block coding. On the other hand, threshold PAPR method is applied to cut down the processing time. However, this DSI method is not better than the conventional PTS method in the respect of the PAPR reduction performance. The DSI method includes the threshold PAPR lower than the PAPR of the OFDM signal, reduces the processing time and improves the BER performance.

Vector Network Analyzer Ferromagnetic Resonance Study of Py Thin Films (Vector Network Analyzer를 이용한 Py 박막의 강자성공명연구)

  • Shin, Yong-Hwack;Ha, Seung-Seok;Kim, Duck-Ho;You, Chun-Yeol
    • Journal of the Korean Magnetics Society
    • /
    • v.20 no.1
    • /
    • pp.18-23
    • /
    • 2010
  • Ferromagnetic resonance (FMR) measurement is an important experimental technique for the study of magnetic dynamics. We designed and set up the vector network analyzer ferromagnetic resonance (VNA-FMR) measurement system with home made coplanar waveguides (CPW). We examined 10-, 20-, 40-nm thick Py thin films to test the performance of the VNA-FMR measurement system. We measured S-parameter (transmission/reflection coefficient) of Py thin films on a CPW. Resonance frequency is investigated from 2.5 to 7 GHz for a field range from 0 to 490 Oe. The VNA-FMR data shows the resonance frequency increment when the external magnetic field increases. We also investigated Gilbert damping constant of Py thin film using resonance frequency (${\omega}_r$) and linewidth ($\Delta\omega$). After investigating dependence of thickness, we find that an decrease in S-parameter intensity as Py thin film thickness decreases. And the FMR results show that the effective saturation magnetization, $M_{eff}$, increase from 7.205($\pm$0.013) kOe to 7.840($\pm$0.014) kOe, while the film thickness varies from 10 to 40 nm.

Age-Hardening Behavior of SiCp Reinforced 6061 Aluminum Alloy Composites (SiCp/6061Al합금복합재료의 시효거동)

  • An, Haeng-Geun;Yu, Jeong-Hui;Kim, Seok-Won;U, Gi-Do
    • Korean Journal of Materials Research
    • /
    • v.10 no.12
    • /
    • pp.793-798
    • /
    • 2000
  • The age-hardening behavior of unreinforced 6061 Al alloy and SiCp/6061 Al alloy composites reinforced with different size of SiC particle (average diameter ; 0.7$\mu\textrm{m}$ and 7.0$\mu\textrm{m}$) was investigated by hardness measurement, calorimetric technique and transmission electron microscopy. At 17$0^{\circ}C$ isothermal aging treatment, the peak aging time of 0.7$\mu\textrm{m}$SiCp/6061Al alloy composite and 7.0$\mu\textrm{m}$SiCp/6061Al alloy composite is shorter than that of unreinforced 6061Al alloy, and the aging of 7.0$\mu\textrm{m}$SiCp/6061Al alloy composite is accelerated more than that of 0.7$\mu\textrm{m}$SiCp/6061Al alloy composite. This acceleration is due to the increase of dislocation density by the compositeness with SiCp and the SiC particle size. In the peak aged condition, the major strengthening phase of these materials is intermediate $\beta$ phase(Mg$_2$Si), and the activation energy for the formation of $\beta$ phase is considerably decreased by the compositeness with SiCp and the increasing of SiC Particle site.

  • PDF

Real-Time Monitoring of Mitochondrial ATP Synthesis and Hydrolysis by Surface Infrared Spectroscopy

  • Yamaguchi, Ryo-Taro;Hirano-Iwata, Ayumi;Aonuma, Yuki;Yoshimura, Yuya;Shinohara, Yasuo;Kimura, Yasuo;Niwano, Michio
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.108-109
    • /
    • 2013
  • Mitochondria play key roles in the production of cell's energy. Their dominant function is the synthesis of adenosine 5'-triphosphate (ATP) from adenosine diphosphate (ADP) and phosphate (Pi) through the oxidative phosphorylation. Evaluation of drug-induced mitochondrial toxicity has become increasingly important since mitochondrial dysfunction has recently been implicated in numerous diseases including cancer and diabetes mellitus. Mitochondrial functions have been monitored via oxygen consumption, mitochondrial membrane potential, and more importantly via ATP synthesis since ATP synthesis is the most essential function of mitochondria. Various analytical methods have been employed to investigate ATP synthesis in mitochondria, including high performance liquid chromatography (HPLC), bioluminescence technique, and pH measurement. However, most of these methods are based on destructive analysis or indirect monitoring through the enzymatic reaction. Infrared absorption spectroscopy (IRAS) is one of the useful techniques for real-time, label-free, and direct monitoring of biological reactions [1,2]. However, the strong water absorption requires very short path length in the order of several micrometers. Transmission measurements with thin path length are not suitable for mitochondrial assays because solution handlings necessary for evaluating mitochondrial toxicity, such as rapid mixing of drugs and oxygen supply, are difficult in such a narrow space. On the other hand, IRAS in the multiple internal reflection (MIR) geometry provides an ideal optical configuration to combine solution handling and aqueous-phase measurement. We have recently reportedon a real-time monitoring of drug-induced necrotic and apoptotic cell death using MIR-IRAS [3,4]. Clear discrimination between viable and damaged cells has been demonstrated, showing a promise as a label-free and real-time detection for cell-based assays. In the present study, we have applied our MIR-IRAS system to mitochondria-based assays by monitoring ATP synthesis in isolated mitochondria from rat livers. Mitochondrial ATP synthesis and hydrolysis were in situ monitored with MIR-IRAS, while dissolved oxygen level and solution pH were simultaneously monitored with O2 and pH electrodes, respectively. It is demonstrated that ATP synthesis and hydrolysis can be monitored by the IR spectral changes in phosphate groups in adenine nucleotides and MIR-IRAS is useful for evaluating time-dependent drug effects of mitochondrial toxicants.

  • PDF

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Analysis of Performance of Digital Retrodirective Antenna Technology in High-Speed Rail (고속 철도 환경에서의 디지털 역지향성 안테나 기술 성능 분석)

  • Bok, Junyeong;Lee, Seung Hwan;Shin, Dong Jin;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.11
    • /
    • pp.1264-1271
    • /
    • 2012
  • Fast tracking is important for high-speed data transmission in high-speed mobile environment such as high speed rail and vehicular. Digital retrodirective array antenna is possible to do automatically beam tracking because it can control the phase information of the output signal toward opposite direction to input signal without no a priori knowledge of the arrival direction. Also, Digital retrodirective array antennas has merit that it is easy to upgrade and modify compare with analogue retrodirective array antennas. In this paper, we analyze the BER performance of digital retrodirective array antenna under AWGN environment and multipath signal. Simulation results show correct phase estimation and conjugation of retrodirective array antenna by using phase detector block. Also, phase conjugation technique has better BER performance about 1 dB at source than that of without phase conjugation when phase lag is $15^{\circ}$ in AWGN environment. This paper also discusses effect of the presence of multipath signal. Phase and amplitude error about direction of direct signal occurs when retrodirective array system is affected by interference and multipath signal in the presence of multipath signal.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.