The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Byeong-Hee ROH(3hit)

1-3hit
  • An Analysis on the Effect of I-Picture Start Time Arrangement of Superposed VBR MPEG Videos for the Multiplexing Performances

    Byeong-Hee ROH  Seung-Wha YOO  Tae-Yong KIM  Jae-Kyoon KIM  

     
    PAPER-Multimedia Systems

      Vol:
    E83-B No:10
      Page(s):
    2435-2441

    Two main characteristics of VBR MPEG video traffic are the different statistics according to different picture types and the periodic traffic pattern due to GOP structure. Especially, the I-pictures at the beginning of each GOP generate much more traffic than other pictures. Therefore, when several VBR MPEG video sources are superposed, the multiplexing performance can vary according to the variations of their I-picture start times. In this paper, we show how the start time arrangement of the superposed VBR MPEG videos can significantly affect the cell loss ratio characteristics at the multiplexers, by using U-NDPP/D/1/B queueing model. It is also shown that the Lognormal distribution is more suitable for modeling VBR MPEG video traffic than the Normal and Gamma distributions, in the queueing application's view points.

  • Backward Channel Protection Based on Randomized Tree-Walking Algorithm and Its Analysis for Securing RFID Tag Information and Privacy

    Wonjoon CHOI  Myungchul YOON  Byeong-hee ROH  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E91-B No:1
      Page(s):
    172-182

    Eavesdropping on backward channels in RFID environments may cause severe privacy problems because it means the exposure of personal information related to tags that each person has. However, most existing RFID tag security schemes are focused on the forward channel protections. In this paper, we propose a simple but effective method to solve the backward channel eavesdropping problem based on Randomized-tree walking algorithm for securing tag ID information and privacy in RFID-based applications. In order to show the efficiency of the proposed scheme, we derive two performance models for the cases when CRC is used and not used. It is shown that the proposed method can lower the probability of eavesdropping on backward channels near to '0.'

  • A Novel Low-Power Bus Design for Bus-Invert Coding

    Myungchul YOON  Byeong-hee ROH  

     
    LETTER-Digital

      Vol:
    E90-C No:4
      Page(s):
    731-734

    This letter presents a novel implementation for Bus-Invert Coding called No Invert-Line Bus-Invert Coding (NIL-BIC) architecture. It not only removes the invert-lines used in previous BIC implementations, but sends the coding information without additional bus-transitions. NIL-BIC can save about 50% more bus-power than the implementations using invert-line.