• Title/Summary/Keyword: Additive Algorithm

Search Result 312, Processing Time 0.023 seconds

Joint Symbol Detection and Channel Estimation Methods for an OFDM System in Fading Channels (페이딩 채널환경에서 OFDM 시스템에 대한 심볼 검출 및 채널 추정 기법)

  • Cho, Jin-Woong;Kang, Cheol-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.3
    • /
    • pp.9-18
    • /
    • 2001
  • In this paper, we present the joint symbol detection and channel estimation for an orthogonal frequency division multiplexing (OFDM) system in fading channels. The proposed methods are based on decision-directed channel estimation (DDCE) method and their symbol detection is achieved by using Viterbi algorithm. This Viterbi decision-directed channel estimation (VDDCE) method tracks time-varying channels and detects a maximum likelihood symbol sequence. Recursive Viterbi decision-directed channel estimation (RVDDCE) method based on VDDCE method is proposed to shorten the detecting depth. In this method, channel estimate and Viterbi processing are recursively performed every interval of training symbol. Also, average chann'el estimation (ACE) technique to reduce the effect of additive white Gaussian noise (AWGN) is applied VDDCE method and RVDDCE method. These proposed methods arc demonstrated by computer simulation.

  • PDF

Performance of W-CDMA System with SOVA-based Turbo Decoder in ITU-R Realistic Channel (ITU-R 실측채널에서 SOVA 기반의 터보부호를 적용한 W-CDMA 시스템의 성능 분석)

  • Jeon Jun-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1613-1619
    • /
    • 2004
  • Turbo codes of long block sizes have been known to show very good performance in an AWGN channel and the turbo code has been strongly recommended as error correction code for W-CDMA in 3GPP(3rd Generation Partnership Project). Recently, turbo codes of short block sizes suitable for real time communication systems have attracted a lot of attention. Thus, in this paper we consider the turbo code of 1/3 code rate and short frame size of 192 bits in ITU-R channel model. We analyzed the performance of W-CDMA systems of 10MHz bandwidths employing RAKE receiver with not only MRC diversity but also SOVA-based turbo code.

Analysis of Temperature Rise History Considering Construction Environments in Mass Concrete Structural Element (매스콘크리트 구조체의 주변환경을 고려한 온도이력 해석)

  • 이장화;변근주
    • Magazine of the Korea Concrete Institute
    • /
    • v.8 no.4
    • /
    • pp.191-199
    • /
    • 1996
  • Cracks occur in mass concrete structures during construction if temperature of the concrete due to heat of hydration is suddenly changed. The temperature is also changed after placement of mass concrete by construction environments on structures. However, methods which can analyze the temperature history of mass concrete considering the construction environments have not been developed yet. In this research, an algorithm and finite element analysis program is developed for the analysis of temperature rise history of mass concrete considering quantitatively heat transfer coefficient and construction environmental conditions such as climate conditions, curing conditions, forms and form removal, and additive curing. By comparing analysis results of the program with experimental data, other research data, and analysis results by a finite element program ADINAT, validity and accuracy of the program is verified.

Computational Design of Electrode Networks for Preferentially Aligned Short Fiber Composite Component Fabrication via Dielectrophoresis

  • Srisawadi, Sasitorn;Cormier, Denis R.;Harrysson, Ola L.A.;Modak, Sayantan
    • International Journal of CAD/CAM
    • /
    • v.12 no.1
    • /
    • pp.20-28
    • /
    • 2012
  • Finite Element Analysis (FEA) is often used to identify local stress/strain concentrations where a component is likely to fail. In order to reduce the degree of strain concentration, component thickness can be increased in those regions, or a stronger material can be used. In short fiber reinforced composite materials, strength and stiffness can be increased through proper fiber alignment. The field-aided microtailoring (FAiMTa) process is one promising method for doing this. FAiMTa uses principles of dielectrophoresis to preferentially align particles or fibers within a matrix. To achieve the preferred fiber orientation, an interdigitated electrode network must be integrated into the mold halves which can be fabricated by additive manufacturing (AM) processes. However, the process of determining the preferred fiber arrangements and electrode locations can be very challenging. This paper presents algorithms to semi-automate the interdigitated electrode design process. The algorithm has been implemented in the Solidworks CAD system and is demonstrated in this paper.

Development of Low Reynolds Number k-ε Model for Prediction of a Turbulent Flow with a Weak Adverse Pressure Gradient (약한 역압력구배의 난류유동장 해석을 위한 저레이놀즈수 k-ε 모형 개발)

  • Song, Kyoung;Cho, Kang Rae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.5
    • /
    • pp.610-620
    • /
    • 1999
  • Recently, numerous modifications of low Reynolds number $k-{\epsilon}$ model have boon carried out with the aid of DNS data. However, the previous models made in this way are too intricate to be used practically. To overcome this shortcoming, a new low Reynolds number $k-{\epsilon}$ model has boon developed by considering the distribution of turbulent properties near the wall. This study proposes the revised a turbulence model for prediction of turbulent flow with adverse pressure gradient and separation. Nondimensional distance $y^+$ in damping functions is changed to $y^*$ and some terms modeled for one dimensional flow in $\epsilon$ equations are expanded into two or three dimensional form. Predicted results by the revised model show an acceptable agreement with DNS data and experimental results. However, for a turbulent flow with severe adverse pressure gradient, an additive term reflecting an adverse pressure gradient effect will have to be considered.

Optimal Harvest-Use-Store Design for Delay-Constrained Energy Harvesting Wireless Communications

  • Yuan, Fangchao;Jin, Shi;Wong, Kai-Kit;Zhang, Q.T.;Zhu, Hongbo
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.902-912
    • /
    • 2016
  • Recent advances in energy harvesting (EH) technology have motivated the adoption of rechargeable mobile devices for communications. In this paper, we consider a point-to-point (P2P) wireless communication system in which an EH transmitter with a non-ideal rechargeable battery is required to send a given fixed number of bits to the receiver before they expire according to a preset delay constraint. Due to the possible energy loss in the storage process, the harvest-use-and-store (HUS) architecture is adopted. We characterize the properties of the optimal solutions, for additive white Gaussian channels (AWGNs) and then block-fading channels, that maximize the energy efficiency (i.e., battery residual) subject to a given rate requirement. Interestingly, it is shown that the optimal solution has a water-filling interpretation with double thresholds and that both thresholds are monotonic. Based on this, we investigate the optimal double-threshold based allocation policy and devise an algorithm to achieve the solution. Numerical results are provided to validate the theoretical analysis and to compare the optimal solutions with existing schemes.

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.

Error Resilience in Image Transmission Using LVQ and Turbo Coding

  • Hwang, Junghyeun;Joo, Sanghyun;Kikuchi, Hisakazu;Sasaki, Shigenobu;Muramatsu, Shogo;Shin, JaeHo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.478-481
    • /
    • 2000
  • In this paper, we propose a joint coding system for still images using source coding and powerful error correcting code schemes. Our system comprises an LVQ (lattice vector quantization) source coding for wavelet transformed images and turbo coding for channel coding. The parameters of the image encoder and channel encoder have been optimized for an n-D (dimension) cubic lattice (D$_{n}$, Z$_{n}$), parallel concatenation fur two simple RSC (recursive systematic convolutional code) and an interleaver. For decoding the received image in the case of the AWGN (additive white gaussian noise) channel, we used an iterative joint source-channel decoding algorithm for a SISO (soft-input soft-output) MAP (maximum a posteriori) module. The performance of transmission system has been evaluated in the PSNR, BER and iteration times. A very small degradation of the PSNR and an improvement in BER were compared to a system without joint source-channel decoding at the input of the receiver.ver.

  • PDF

A Study on Noise Removal using Pixel Distribution of Local Mask in Degraded Image by AWGN (AWGN에 훼손된 영상에서 국부 마스크의 화소 분포를 이용한 잡음 제거에 관한 연구)

  • Kwon, Se-Ik;Hwang, Yeong-Yeun;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.933-935
    • /
    • 2015
  • Currently, image processing is being utilized in various fields and many studies on the image restoration is being progressed in order to eliminate the noise being generated during the process of transmitting, processing and storing of image. There are various types of noises included in the image according to the causes and types but AWGN is the most representative. In this paper, an algorithm was proposed which applies the variables differently according to the differences in surrounding pixels and central pixels within the local mask in order to mitigate the AWGN included in the image.

  • PDF

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theory (Bayes 판단 이론 기반 멀티미디어 워터마크 검출 알고리즘)

  • 권성근;이석환;김병주;권기구;하인성;권기룡;이건일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7A
    • /
    • pp.695-704
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.