• 제목/요약/키워드: 채널 구성

Search Result 1,553, Processing Time 0.03 seconds

A Study on the Design of Digital Frequency Discriminator with 3-Channel Delay Lines (3채널 지연선을 가진 디지털주파수판별기의 설계에 관한 연구)

  • Kim, Seung-Woo;Choi, Jae-In;Chin, Hui-cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.44-52
    • /
    • 2017
  • In this paper, we propose a DFD (Digital Frequency Discriminator) design that has better frequency discrimination and a smaller size. Electronic warfare equipment can analyze different types of radar signal such as those based on Frequency, Pulse Width, Time Of Arrival, Pulse Amplitude, Angle Of Arrival and Modulation On Pulse. In order for electronic warfare equipment to analyze radar signals with a narrow pulse width (less than 100ns), they need to have a special receiver structure called IFM (Instantaneous Frequency Measurement). The DFD (Digital Frequency Discriminator) is usually used for the IFM. Because the existing DFDs are composed of separate circuit devices, they are bulky, heavy, and expensive. To remedy these shortcomings, we use a three delay line ($1{\lambda}$, $4{\lambda}$, $16{\lambda}$) in the DFD, instead of the four delay line ($1{\lambda}$, $4{\lambda}$, $16{\lambda}$, $64{\lambda}$) generally used in the existing DFDs, and apply the microwave integrated circuit method. To enhance the frequency discrimination, we detect the pulse amplitude and perform temperature correction. The proposed DFD has a frequency discrimination error of less than 1.5MHz, affording it better performance than imported DFDs.

A Study on the Effective VTS Communications Analysis by the Method of VCDF in Busan Port (VCDF 방식을 통한 효율적인 VTS 통신 데이터 분석에 관한 연구 - 부산항을 대상으로 -)

  • Kim, Bong-Hyun;Park, Young-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.4
    • /
    • pp.311-318
    • /
    • 2016
  • The VTS concept was located as a principal methods of maritime safety administration in world's major harbors and expected to become the pivotal role for the future of the maritime and harbor society with e-Navigation epoch. If recent limelight concept of big-data has been included in aspect of information gathering and analysis with various studies, it's required advanced studies to improve the information analysis capability and application range of the data that can be mining by the VTS. In this study, contrast to other studies that aimed quantitative analysis as communication number, it can be mining the time information and each of the communication VTS for the target vessel, including qualitative analysis, such as the purpose or the type of communication. This comparison across multiple items of the collected information, and presenting the VTS data mining model (VCDF) that can be analyzed for the purpose of analyzing way, type and number of communication by ship's type, also number of violations through VTS communication. First, In Busan port case, it shows frequently information service and shows frequently communicating with particular types of vessels. Second, Passive VTS carried out notwithstanding many kinds of traffic violations due to communication congestion. This arranged information can be used as data for the analysis, as possible the level of traffic for VTSO situational awareness, which pointed to the 'workloads' in 'IALA Guideline' and could be used as a database for future research of e-Navigation.

Development of MRI Simulator Early Diagnosis Program for Self Learning (자가 학습을 위한 MRI Simulator 초기 검사 프로그램 개발)

  • Jeong, Cheon-Soo;Kim, Chong-Yeal
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.403-410
    • /
    • 2015
  • Since 1970, MRI has greatly been developing in terms of strength of magnetic field, the number of receipt channels, and short time of examination. With the development of digital systems and wireless network, hospitals have also acquired, saved, and managed digital images taken by various kinds of medical imaging equipment. However, domestic universities fail to provide practice training course independently thanks to expensive practice equipment and high maintenance cost, and rely on clinical training. Therefore, this study developed a MR patient diagnosis program based on Windows PC to help out students before their working in clinical filed. The designed Relational Database of MRI Simulator is made up of seven tables according to functions and data characteristics. Regarding the designed patient information, each stepwise function was classified by the patient registration method in clinical field. In addition, on the assumption of the basic information for diagnosis, each setting and content were classified. The menu by execution step was arrayed on the left side for easy view. For patient registration, a patient's name, gender, unique ID, birth date, weight, and other types of basic information were entered, and the patient's posture and diagnosis direction were set up. In addition, the body regions for diagnosis and Pulse Sequence were listed for selection. Also, Protocol name and other additional factors were allowed to be entered. The final window was designed to check diagnosis images, patient information, and diagnosis conditions. By learning how to enter patient information and change diagnosis conditions in this program, users will be able to understand more theories and terms learned in practice and thereby to shorten their learning time in actual clinical work.

A Design of Software Receiver for GNSS Signal Processing

  • Choi, Seung-Hyun;Kim, Jae-Hyun;Shin, Cheon-Sig;Lee, Sang-Uk;Kim, Jae-Hoon
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.2
    • /
    • pp.48-52
    • /
    • 2007
  • Recently, the research of GPS receiver which uses the Software-Defined Radio(SDR) technique is being actively proceeded instead of traditional hardware-based receiver. The software-based GPS receiver indicates that the signal acquisition and tracking treated by the hardware-based platform are processed as the software technique through a microprocessor. In this paper, GPS software receiver is designed by using SDR technique and then the signal acquisition, tracking, and the navigation message decoding parts are verified through the PC-based simulation. Moreover, the efficient algorithms are developed about the signal acquisition and tracking parts in order to obtain the accurate pseudorange. Finally, the pseudorange is calculated through the relative channel delay received through the different satellite of L1 frequency band. GPS software receiver proposed in this paper will be included in the element of GPS/Galileo complex system of development target and will provide not only the method that verifies the performance for Galileo Sensor Station standard but also usability by providing various debugging environments.

  • PDF

Effective Parent-Child Key Establishment Algorithm used ZigBee Sensor Network (ZigBee 센서네트워크에서 효율적인 Parent - Child 키 연결 알고리즘)

  • Seo, Dae-Youl;Kim, Jin-Chul;Kim, Kyoung-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.35-45
    • /
    • 2006
  • Coordinator is defining so that function as most trust center that is point in security in ZigBee Alliance. Because must do height connection with coordinator in device signing to PAN newly, coordinator has shortcoming that subordinate is revealed to danger directly to Centered and cattish device. When do height connection some device, do not become problem, but if network is huge, coordinator's subordinate shall increase as traffic quantity which happen in coordinator increases. Also, in ZigBee security to link network kina of transmission and mutually certification in ZigBee Alliance standard include, but I do not provide method to deliver master key in each node safely. Because process that transmit master key passes through channel that do not secure, master key has shortcoming that is revealed directly. In this paper, I suggested Parent-Child key establishment algorithm to solve these problem. Proposed algorithm consists of two structures. Master key establishment algorithm and device that sign to PAN newly that can use one-way Hash chain and transmit master key safety are consisted of Parent-Child network key establishment algorithm that do child node and parent node key establishment as can do key establishment efficiently. Method that device proposes in case method that propose in case have master key establishment time was shown better performance $200{\sim}1300ms$ than existing method, and device does not have master key than existing method height connect time about $400{\sim}500ms$ better performance see.

Distributed Alamouti Space Time Block Coding Based On Cooperative Relay System (협동 중계 시스템을 이용한 분산 Alamouti 시공간 블록 부호)

  • Song, Wei;Cho, Kye-Mun;Lee, Moon-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.16-23
    • /
    • 2009
  • In this paper, we propose a new distributed Alamouti space-time block coding scheme using cooperative relay system composed of one source node, three relay nodes and one destination node. The source node is assumed to be equipped with two antennas which respectively use a 2-beam array to communicate with two nodes selected from the three relay nodes. During the first time slot, the two signals which respectively were transmitted by one antenna at the source, are selected by one relay node, added, amplified, and forwarded to the destination. During the second time slot, the other two relay nodes implement the conjugate and minusconjugate operations to the two received signals, respectively, each in turn is amplified and forwarded to the destination node. This transmission scheme represents a new distributed Alamouti space-time block code that can be constructed at the relay-destination channel. Through an equivalent matrix expression of symbols, we analyze the performance of this proposed space-time block code in terms of the chernoff upper bound pairwise error probability (PEP). In addition, we evaluate the effect of the coefficient $\alpha$ ($0{\leq}{\alpha}{\leq}1$) determined by power allocation between the two antennas at the source on the received signal performance. Through computer simulation, we show that the received signals at the three relays have same variance only when the value of $\alpha$ is equal to $\frac{2}{3}$, as a consequence, a better performance is obtained at the destination. These analysis results show that the proposed scheme outperforms conventional proposed schemes in terms of diversity gain, PEP and the complexity of relay nodes.

A Study of Noncontact Heartbeat and Respiration Detection Using the Doppler Radar (도플러 레이더를 이용한 비접촉 방식의 심박 및 호흡 검출에 관한 연구)

  • Shin, Jae-Yeon;Cho, Sung-Pil;Jang, Byung-Jun;Park, Ho-Dong;Lee, Yun-Soo;Lee, Kyoung-Joung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.1
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, a 2.4 GHz doppler radar system consisting of a doppler radar sensor and a baseband module were designed to detect heart beat and respiration signal without direct skin contact. The doppler radar system emits RF signal of 2.4 GHz toward human chest, and then detects phase modulation of the reflected signal so as to investigate cardiopulmonary activities. The heartbeat and respiration signals acquired from I/Q channels of the doppler radar system are applied to the pre-processing circuit, the amplification circuit, and the offset circuit of the baseband module. The designed system was tested on mouse, rabbit and mankind, which have different range of heart rates and respiration signals, to evaluate detection accuracy of the system. ECG acquisition system and respiration transducer were used to generate the reference signal. In our experiments, a performance of detection were found to be high in the case that the subject stays still. In this paper, we confirmed that non-contact heart beat and respiration detection using the doppler radar has the possibility and limitation according to distance, cardiopulmonary activities, range of heart rates and respiration.

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.

Analysis of Wireless Network in Freight Container Terminal and Methods for Service Quality Enhancement (컨테이너 터미널의 무선 네트워크 분석과 서비스 품질 향상 방안)

  • Han, Seung-Ho;Park, Hyun-Sung;Kim, Jong-Deok;Kim, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.235-246
    • /
    • 2009
  • The number of industry wireless networks based on IEEE 802.11 WLAN technology deployed in large outdoor work sites, such as freight container terminal, is increasing these days. Wider service coverage, frequent movements of stations and high requirement on service reliability are main characteristics of these networks compared to the conventional IEEE 802.11 networks used in home, office and school. While the importance of these networks Bets higher, we can hardly find previous studies including concrete analysis on these networks based on actual experiments. We carried out several field experiments at a freight container terminal to analyze its IEEE 802.11 network and found out some problematic situations, such as over 50% retransmission rates and frequent disruption of communication link while a station is moving. We explain why these problematic situations happen and suggest some solutions, such as application of mesh technology, smart handoff based on location and movement pattern and adjustment of signal strength and channel allocation. Methods and tools used in the experiments are also detailed in the paper which may be helpful for similar future studies.

Vulnerability Discovery Method Based on Control Protocol Fuzzing for a Railway SCADA System (제어프로토콜 퍼징 기반 열차제어시스템 취약점 검출 기법)

  • Kim, Woo-Nyon;Jang, Moon-Su;Seo, Jeongtaek;Kim, Sangwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.362-369
    • /
    • 2014
  • A railway SCADA system is a control systems that provide the trains with the electricity. A railway SCADA system sends commands to the RTUs(remote terminal unit) and then it gathers status information of the field devices in the RTUs or controls field devices connected with the RTUs. The RTU can controls input output modules directly, gathers the status information of the field devices connected with it, and send the information to the control center. In this way, a railway SCADA system monitors and controls the electricity power for running trains. The cyber attackers may use some vulnerabilities in the railway SCADA system software to attack critical infrastructures. The vulnerabilities might be created in the railway software development process. Therefore it need to detect and remove the vulnerabilities in the control system. In this paper we propose a new control protocol fuzzing method to detect the vulnerabilities in the DNP3 protocol based application running on VxWorks in RTU(Remote Terminal Unit) that is a component of the centralized traffic control system for railway. Debug-channel based fuzzing method is required to obtain process status information from the VxWorks.