• Title/Summary/Keyword: 9 bit 통신

Search Result 340, Processing Time 0.026 seconds

Improved changed region detection and motion estimation for object-oriented coding (객체기반 부호화에서의 개선된 움직임 영역 추출 및 추정 기법)

  • 정의윤;박영식;송근원;한규필;하영호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.2043-2052
    • /
    • 1997
  • The object-oriented coding technique which is one of the coding methods in very low bit rate environment is suitable for videophone image sequence. The selection of source model affect image analysis. In this paper, an image analysis method for the object-oriented coding is presented. The process is composed of changed region detection andmotion estimateion. First, we use the standard deviation of frame difference as thrreshold to extract themoving area. If thesum of gray values in mask is greater than the threshold, the center pixel of the mask is regarded as moving region. After moving is detected in changed region by edge operator, observation point is determined from moving region. The motion is estimated by 6-parameter mapping method with determined observation point. The experimantal resutls show that the proposed method can significantly improve the image quality.

  • PDF

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Compensation Algorithm of DCO Cumulative Error in the GNSS Signal Generator (GNSS 신호생성기에서 DCO 누적오차 보상 알고리즘)

  • Kim, Taehee;Sin, Cheonsig;Kim, Jaehoon
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.119-125
    • /
    • 2014
  • In this paper, we developed the signal generator of GNSS navigation signals and analysis the performance of DCO(Digitally Clock Oscillator) compensation algorithm for cumulative distance error thorough simulation. In general, To generate a GNSS signal calculates the Doppler and Initial Pseudorange by using the location information of the receiver and the satellite. The GNSS signal generator generates a signal by determine the carrier and code output frequency using the Doppler information which is calculated as a function of time. The output frequency of the carrier and code would be used the DCO scheme. At this time, It extract the bit and code information on a for each sample by accumulating the DCO. an error of Pseudorange is generated by the cumulative error of the DCO. If Pseudorange error occurs, so that the influence to and operation of the receiver. Therefore, in this paper, we implemented the accumulated error compensation algorithm of the DCO to remove the accumulated error components DCO thereof, Pseudorange accumulated error is removed through the experiment, it was confirmed to be a high accuracy can be operated.

The Implementation of Integrated Information Network for JANG-MOK Oceanographic Research Ship (시험조사선 장목호의 종합정보통신망 구현)

  • Park Jong-Won;Kim Dug-Jin;Baek Hyuk;Park Dong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.91-94
    • /
    • 2006
  • KORDI(Korea Ocean Research & Development Institute) built a research vessel JANG-MOK with 40 G/T for a survey and observation of oceanographic environmental characteristics at coastal region in September 2005. This paper introduced the implementation for hardware and software of an integrated information network that loaded in JANG-MOK, and depicted the function of an integrated information network, such as an installation of ga-bit based network, RS232C serial & UDP network interface of instruments, a data logging software of measured data, Hawkeye II software for supporting the efficient survey works, and a real-time navigation viewer. In addition, we presents the another implementation method for an integrated information network of oceanographic research vessels.

  • PDF

Cooperative Power Control Scheme for a Spectrum Sharing System

  • Ban, Tae-Won;Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.641-646
    • /
    • 2011
  • In this paper, we investigate a power control problem which is very critical in underlay-based spectrum sharing systems. Although an underlay-based spectrum sharing system is more efficient compared to an overlay-based spectrum sharing system in terms of spectral utilization, some practical problems obstruct its commercialization. One of them is a real-time-based power adaptation of secondary transmitters. In the underlay-based spectrum sharing system, it is essential to adapt secondary user's transmit power to interference channel states to secure primary users' communication. Thus, we propose a practical power control scheme for secondary transmitters. The feedback overhead of our proposed scheme is insignificant because it requires one-bit signaling, while the optimal power control scheme requires the perfect information of channel states. In addition, the proposed scheme is robust to feedback delay. We compare the performance of the optimal and proposed schemes in terms of primary user's outage probability and secondary user's throughput. Our simulation results show that the proposed scheme is almost optimal in terms of both primary user's outage probability and secondary user's throughput when the secondary user's transmit power is low. As the secondary user's transmit power increases, the primary user's outage probability of the proposed scheme is degraded compared with the optimal scheme while the secondary user's throughput still approaches that of the optimal scheme. If the feedback delay is considered, however, the proposed scheme approaches the optimal scheme in terms of both the primary user's outage probability and secondary user's throughput regardless of the secondary user's transmit power.

A New Design of High-Speed 1-Bit Full Adder Cell Using 0.18${\mu}m$ CMOS Process (0.18${\mu}m$ CMOS 공정을 이용한 새로운 고속 1-비트 전가산기 회로설계)

  • Kim, Young-Woon;Seo, Hea-Jun;Cho, Tae-Won
    • Journal of IKEEE
    • /
    • v.12 no.1
    • /
    • pp.1-7
    • /
    • 2008
  • With the recent development of portable system such as mobile communication and multimedia. Full adders are important components in applications such as digital signal processors and microprocessors. Thus It is important to improve the power dissipation and operating speed for designing a full adder. We propose a new adder with modified version of conventional Ratioed logic and Pass Transistor logic. The proposed adder has the advantages over the conventional CMOS, TGA, 14T logic. The delay time is improved by 13% comparing to the average value and PDP(Power Delay Product) is improved by 9% comparing to the average value. Layouts have been carried out using a 0.18um CMOS design rule for evaluation purposes. The physical design has been evaluated using HSPICE.

  • PDF

Performance Evaluation of Hybrid DS/SFH-CDMA Noncoherent MFSK Signal with Channel Coding and MRC Diversity Techniques in Mobile Communication Nakagami Fading Channels (이동통신 Nakagami 페이딩 채널에서 채널코딩과 최대비합성 다이버시티 기법에 의한 Hybrid DS / SFH-CDMA 비동기 MFSK 신호의 성능평가)

  • ;Norihiko Morinaga
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.4
    • /
    • pp.342-353
    • /
    • 1997
  • This paper presents an analytical evaluation of a hybrid direct-sequence/slow frequencyhopped code division multiple-access (DS/SFH-CDMA) system employing noncoherent M-ary frequency shift keying(MFSK) modulation in a multiple Nakagami fading (m) environment. Multipath interference (MPI) and multi-access interference (MAI) is taken into account and the spectral efficiency is calculated for uncoded as well as channel coding systems. Predetection multipath maximal ratio combining (MRC) diversity in conjunction with interleaved channel coding (Hamming(7,4) code, BCH(15, 7) code and RS (7, 4), (15, 9)) code ) is employed for improving the bit error rate (BER) performance. The BER of noncoherent hybrid system is obtained using a Gaussian interference approximation.

  • PDF

TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF$(2^m)$ on 8-bit Micaz Mote (TinyECCK : 8 비트 Micaz 모트에서 GF$(2^m)$상의 효율적인 타원곡선 암호 시스템 구현)

  • Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.9-21
    • /
    • 2008
  • In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF$(2^m)$ on sensor motes using small word size is not appropriate because partial XOR multiplication over GF$(2^m)$ is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF$(2^m)$ on sensor motes, their performances are not satisfactory enough due to the redundant memory accesses that result in inefficient field multiplication and reduction. Therefore, we propose some techniques for reducing unnecessary memory access instructions. With the proposed strategies, the running time of field multiplication and reduction over GF$(2^{163})$ can be decreased by 21.1% and 24.7%, respectively. These savings noticeably decrease execution times spent in Elliptic Curve Digital Signature Algorithm (ECDSA) operations (Signing and verification) by around $15{\sim}19%$.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Performance Improvement of Downlink Real-Time Traffic Transmission Using MIMO-OFDMA Systems Based on Beamforming (Beamforming 기반 MIMO-OFDMA 시스템을 이용한 하향링크 실시간 트래픽 전송 성능 개선)

  • Yang Suck-Chel;Park Dae-Jin;Shin Yo-An
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.1-9
    • /
    • 2006
  • In this paper, we propose a MIMO-OFDMA (Multi Input Multi Output-Orthogonal Frequency Division Multiple Access) system based on beamforming for performance improvement of downlink real-time traffic transmission in harsh channel conditions with low CIR (Carrier-to-Interference Ratio). In the proposed system, we first consider the M-GTA-SBA (Modified-Grouped Transmit Antenna-Simple Bit Allocation) using effective CSI (Channel State Information) calculation procedure based on spatial resource grouping, which is adequate for the combination of MRT (Maximum Ratio Transmission) in the transmitter and MRC (Maximum Ratio Combining) in the receiver. In addition, to reduce feedback information for the beamforming, we also apply QEGT (Quantized Equal Gain Transmission) based on quantization of amplitudes and phases of beam weights. Furthermore, considering multi-user environments, we propose the P-SRA (Proposed-Simple Resource Allocation) algorithm for fair and efficient resource allocation. Simulation results reveal that the proposed MIMO-OFDMA system achieves significant improvement of spectral efficiency in low CRI region as compared to a typical open-loop MIMO-OFDMA system using pseudo-orthogonal space time block code and H-ARQ IR (Hybrid-Automatic Repeat Request Incremental Redundancy).