• 제목/요약/키워드: Binary random sequence

검색결과 61건 처리시간 0.022초

Evaluation of a Laser Altimeter using the Pseudo-Random Noise Modulation Technique for Apophis Mission

  • Lim, Hyung-Chul;Sung, Ki-Pyoung;Choi, Mansoo;Park, Jong Uk;Choi, Chul-Sung;Bang, Seong-Cheol;Choi, Young-Jun;Moon, Hong-Kyu
    • Journal of Astronomy and Space Sciences
    • /
    • 제38권3호
    • /
    • pp.165-173
    • /
    • 2021
  • Apophis is a near-Earth object with a diameter of approximately 340 m, which will come closer to the Earth than a geostationary orbit in 2029, offering a unique opportunity for characterizing the object during the upcoming encounter. Therefore, Korea Astronomy and Space Science Institute has a plan to propose a space mission to explore the Apophis asteroid using scientific instruments such as a laser altimeter. In this study, we evaluate the performance metrics of a laser altimeter using a pseudorandom noise modulation technique for the Apophis mission, in terms of detection probability and ranging accuracy. The closed-form expression of detection probability is provided using the cross correlation between the received pulse trains and pseudo-random binary sequence. And the new ranging accuracy model using Gaussian error propagation is also derived by considering the sampling rate. The operation range is significantly limited by thermal noise rather than background noise, owing to not only the low power laser but also the avalanche photodiode in the analog mode operation. However, it is demonstrated from the numerical simulation that the laser altimeter can achieve the ranging performance required for a proximity operation mode, which employs commercially available components onboard CubeSat-scale satellites for optical communications.

Light-weight Classification Model for Android Malware through the Dimensional Reduction of API Call Sequence using PCA

  • Jeon, Dong-Ha;Lee, Soo-Jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권11호
    • /
    • pp.123-130
    • /
    • 2022
  • 최근 API Call 정보를 기반으로 안드로이드 악성코드를 탐지 및 분류하는 연구가 활발하게 진행되고 있다. 그러나 API Call 기반의 악성코드 분류는 방대한 데이터 양과 높은 차원 특성으로 인해 악성코드 분석과 학습 모델 구축 과정에서 과도한 시간과 자원이 소모된다는 심각한 제한사항을 가진다. 이에 본 연구에서는 방대한 API Call 정보를 포함하고 있는 CICAndMal2020 데이터세트를 대상으로 PCA(Principal Component Analysis, 주성분분석)를 사용하여 차원을 대폭 축소시킨 후 LightGBM, Random Forest, k-Nearest Neighbors 등의 다양한 분류 기법 모델을 적용하여 결과를 분석하였다. 그 결과 PCA가 원본 데이터의 특성을 유지하면서 데이터 특성의 차원은 획기적으로 감소시키고 우수한 악성코드 분류 성능을 달성함을 확인하였다. 이진분류 및 다중분류 모두 데이터 특성을 전체 크기의 1% 수준 이하로 줄이더라도 이전 연구 결과보다 높은 수준의 정확도를 나타내었다.

Novel Multiple Access Schemes for IEEE 802.15.4a Low-rate Ultra-wide Band Systems

  • 휘빙;장홍;장경희
    • 한국통신학회논문지
    • /
    • 제35권7A호
    • /
    • pp.682-687
    • /
    • 2010
  • The IEEE 802.15.4a specification targets the low-rate (LR) Impulse-radio (IR) ultra-wideband (UWB) system which is now widely applied in the WPANs considering rather short distance communications with low complexity and power consumption. The physical (PHY) layer uses concatenated coding with mixed binary phase-shift keying and binary pulse-position modulation (BPSK-BPPM), and direct sequence spreading with time hopping in order that both coherent and non-coherent receiver architectures are supported. In this paper, the performances of multiple access schemes compliant with IEEE 802.15.4a specification are investigated with energy detection receiver, which allow avoiding the complex channel estimation needed by a coherent receiver. However, the performance of energy detection receiver is severely degraded by multi-user interference (MUI), which largely diminishes one of the most fascinating advantages of UWB, namely robustness to MUI as well as the possibility to allow parallel transmissions. So as to improve the performance of multiple access schemes, we propose to apply the novel TH sequences as well as to increase the number of TH positions. The simulation results show that our novel multiple access schemes significantly improve the performance against MUI.

A Watermarking Scheme for Shapefile-Based GIS Digital Map Using Polyline Perimeter Distribution

  • Huo, Xiao-Jiao;Lee, Suk-Hwan;Kwon, Seong-Geun;Moon, Kwan-Seok;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제14권5호
    • /
    • pp.595-606
    • /
    • 2011
  • This paper proposes a robust watermarking scheme for GIS digital map by using the geometric properties of polyline and polygon, which are the fundamental components in vector data structure. In the proposed scheme, we calculate the lengths and the perimeters of all polylines and polygons in a map and cluster them to a number of groups. Then we embed the binary watermark by changing the mean of lengths and perimeters in an embedding group. For improving the safety and robustness, we permute the binary watermark through PRNS(pseudo-random number sequence) processing and embed it repeatedly in a model. Experimental results verified that our scheme has a good invisibility, safety and robustness to various geometric attacks and also our scheme needs not the original map in the extracting process of watermark.

Fuzzy-ARTMAP based Multi-User Detection

  • Lee, Jung-Sik
    • 한국통신학회논문지
    • /
    • 제37권3A호
    • /
    • pp.172-178
    • /
    • 2012
  • This paper studies the application of a fuzzy-ARTMAP (FAM) neural network to multi-user detector (MUD) for direct sequence (DS)-code division multiple access (CDMA) system. This method shows new solution for solving the problems, such as complexity and long training, which is found when implementing the previously developed neural-basis MUDs. The proposed FAM based MUD is fast and easy to train and includes capabilities not found in other neural network approaches; a small number of parameters, no requirements for the choice of initial weights, automatic increase of hidden units, no risk of getting trapped in local minima, and the capabilities of adding new data without retraining previously trained data. In simulation studies, binary signals were generated at random in a linear channel with Gaussian noise. The performance of FAM based MUD is compared with other neural net based MUDs in terms of the bit error rate.

A 40 Gb/s Clock and Data Recovery Module with Improved Phase-Locked Loop Circuits

  • Park, Hyun;Kim, Kang-Wook;Lim, Sang-Kyu;Ko, Je-Soo
    • ETRI Journal
    • /
    • 제30권2호
    • /
    • pp.275-281
    • /
    • 2008
  • A 40 Gb/s clock and data recovery (CDR) module for a fiber-optic receiver with improved phase-locked loop (PLL) circuits has been successfully implemented. The PLL of the CDR module employs an improved D-type flip-flop frequency acquisition circuit, which helps to stabilize the CDR performance, to obtain faster frequency acquisition, and to reduce the time of recovering the lock state in the event of losing the lock state. The measured RMS jitter of the clock signal recovered from 40 Gb/s pseudo-random binary sequence ($2^{31}-1$) data by the improved PLL clock recovery module is 210 fs. The CDR module also integrates a 40 Gb/s D-FF decision circuit, demonstrating that it can produce clean retimed data using the recovered clock.

  • PDF

A Semi-blind Digital Watermarking Scheme Based on the Triplet of Significant Wavelet Coefficients

  • Chu, Hyung-Suk;Batgerel, Ariunzaya;An, Chong-Koo
    • Journal of Electrical Engineering and Technology
    • /
    • 제4권4호
    • /
    • pp.552-558
    • /
    • 2009
  • We proposed a semi-blind digital image watermarking technique for copyright protection. The proposed algorithm embedded a binary sequence watermark into significant wavelet coefficients by using a quantization method. The main idea of the quantization method was to quantize a middle coefficient of the triplet of a significant wavelet coefficient according to the watermark's value. Unlike an existing algorithm, which used a random location table to find a coefficient in which the watermark bit will be embedded: the proposed algorithm used quad-tree decomposition to find a significant wavelet coefficient for embedding. For watermark detection, an original host image was not required. Thanks to the usage of significant wavelet coefficients, the proposed algorithm improved the correlation value, up to 0.43, in comparison with the existing algorithm.

유전적 기법에 의한 지구물리자료의 역산 (Inversion of Geophysical Data Using Genetic Algorithms)

  • 김희준
    • 자원환경지질
    • /
    • 제28권4호
    • /
    • pp.425-431
    • /
    • 1995
  • Genetic algorithms are so named because they are analogous to biological processes. The model parameters are coded in binary form. The algorithm then starts with a randomly chosen population of models called chromosomes. The second step is to evaluate the fitness values of these models, measured by a correlation between data and synthetic for a particular model. Then, the three genetic processes of selection, crossover, and mutation are performed upon the model in sequence. Genetic algorithms share the favorable characteristics of random Monte Carlo over local optimization methods in that they do not require linearizing assumptions nor the calculation of partial derivatives, are independent of the misfit criterion, and avoid numerical instabilities associated with matrix inversion. An additional advantage over converntional methods such as iterative least squares is that the sampling is global, rather than local, thereby reducing the tendency to become entrapped in local minima and avoiding the dependency on an assumed starting model.

  • PDF

A Single-ended Simultaneous Bidirectional Transceiver in 65-nm CMOS Technology

  • Jeon, Min-Ki;Yoo, Changsik
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제16권6호
    • /
    • pp.817-824
    • /
    • 2016
  • A simultaneous bidirectional transceiver over a single wire has been developed in a 65 nm CMOS technology for a command and control bus. The echo signals of the simultaneous bidirectional link are cancelled by controlling the decision level of receiver comparators without power-hungry operational amplifier (op-amp) based circuits. With the clock information embedded in the rising edges of the signals sent from the source side to the sink side, the data is recovered by an open-loop digital circuit with 20 times blind oversampling. The data rate of the simultaneous bidirectional transceiver in each direction is 75 Mbps and therefore the overall signaling bandwidth is 150 Mbps. The measured energy efficiency of the transceiver is 56.7 pJ/b and the bit-error-rate (BER) is less than $10^{-12}$ with $2^7-1$ pseudo-random binary sequence (PRBS) pattern for both signaling directions.

ALGORITHMS FOR GENERATING NONLINEAR COMBINERS WITH GIVEN CONDITIONS

  • Rhee, Min-Surp;Shin, Hyun-Yong;Jun, Youn-Bae
    • Journal of applied mathematics & informatics
    • /
    • 제7권1호
    • /
    • pp.269-278
    • /
    • 2000
  • A Boolean function generates a binary sequence which is frequently used in a stream cipher. There are number of critical concepts which a Boolean function, as a key stream generator in a stream cipher, satisfies. These are nonlinearity, correlation immunity, balancedness, SAC(strictly avalanche criterion), PC(propagation criterion) and so on. In this paper, we present the algorithms for generating random nonlinear combining functions satisfying given correlation immune order and nonlinearity. These constructions can be applied for designing the key stream generators. We use Microsoft Visual C++6.0 for our program.