• Title/Summary/Keyword: Bit errors

Search Result 314, Processing Time 0.024 seconds

An Error-Resilient Image Compression Base on the Zerotree Wavelet Algorithm (오류에 강인한 제로트리 웨이블릿 영상 압축)

  • 장우영;송환종;손광훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.7A
    • /
    • pp.1028-1036
    • /
    • 2000
  • In this paper, an error-resilient image compression technique using wavelet transform is proposed. The zerotree technique that uses properties of statistics, energy and directions of wavelet coefficients in the space-frequency domain shows effective compression results. Since it is highly sensitive to the propagation of channel errors, evena single bit error degrades the whole image quality severely. In the proposed algorithm, the image is encoded by the SPIHT(Set Partitioning in Hierarchical Trees) algorithm using the zerotree coding technique. Encoded bitstreams are partitioned into some blocks using the subband correlations and then fixed-length blocks are made by using the effective bit reorganization algorithm. finally, an effective bit allocation technique is used to limit error propagation in each block. Therefore, in low BER the proposed algorithm shows similar compression performance to the zerotree compression technique and in high BER it shows better performance in terms of PSNR than the conventional methods.

  • PDF

The Influence of Noise Environment upon Voice and Data Transmission in the RF-CBTC System

  • Kim, Min-Seok;Lee, Sang-Hyeok;Lee, Jong-Woo
    • International Journal of Railway
    • /
    • v.3 no.2
    • /
    • pp.39-45
    • /
    • 2010
  • The RF-CBTC (Radio Frequency-Communication Based Train Control) System is a communication system in railroad systems. The communication method of RF-CBTC system is the wireless between the wayside device and on-board device. The wayside device collects its location and speed from each train and transmits the distance from the forwarding train to the speed-limit position to it. The on-board device controlling device controls the speed optimum for the train. In the case of the RF-CBTC system used in Korea, transmission frequency is 2.4 [GHz]. It is the range of ISM(Industrial Scientific and Medical equipment) band and transmission of voice and data is performed by CDMA (Code Division Multiple Access) method. So noises are made in the AWGN (Additive White Gaussian Noise) and fading environment. Currently, the SNR (Signal to Noise Ratio) is about 20 [dB], so due to bit errors made by noises, transmission of reliable information to the train is not easy. Also, in the case that two tracks are put to a single direction, it is needed that two trains transmit reliable voice and data to a wayside device. But, by noises, it is not easy that just a train transmits reliable information. In this paper, we estimated the BER (Bit Error Rate) related to the SNR of voice and data transmission in the environment such as AWGN and fading from the RF-CBTC system using the CDMA method. Also, we supposed the SNR which is required to meet the BER standard for voice and data transmission. By increasing the processing gain that is a ratio of chip transmission to voice and data transmission, we made possible voice and data transmission from maximally two trains to a wayside device, and demonstrated it by using Matlab program.

  • PDF

Design of Chipless RFID Tags Using Electric Field-Coupled Inductive-Capacitive Resonators (전계-결합 유도-용량성 공진기를 이용한 Chipless RFID 태그 설계)

  • Junho Yeo;Jong-Ig Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.530-535
    • /
    • 2021
  • In this paper, the design method for a chipless RFID tag using ELC resonators is proposed. A four-bit chipless RFID tag is designed in a two by two array configuration using three ELC resonators with different resonant peak frequencies and one compact IDC resonator. The resonant peak frequency of the bistatic RCS for the IDC resonator is 3.125 GHz, whereas those of the three ELC resonators are adjusted to be at 4.225 GHz, 4.825 GHz, and 5.240 GHz, respectively, by using the gap between the capacitor-shaped strips in the ELC resonator. The spacing between the resonators is 1 mm. Proposed four-bit tag is fabricated on an RF-301 substrate with dimensions of 50 mm×20 mm and a thickness of 0.8 mm. It is observed from experiment results that the resonant peak frequencies of the fabricated four-bit chipless RFID tag are 3.290 GHz, 4.295 GHz, 4.835 GHz, and 5.230 GHz, respectively, which is similar to the simulation results with errors in the range between -2.3% and 0.2%.

Performance of Convolution Coding Underwater Acoustic Communication System on Frequency Selectivity Index (주파수 선택 지표에 따른 길쌈 부호 수중 음향 통신 시스템의 성능 평가)

  • Seo, Chulwon;Park, Jihyun;Park, Kyu-Chil;Shin, Jungchae;Jung, Jin Woo;Yoon, Jong Rak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.6
    • /
    • pp.494-501
    • /
    • 2013
  • The convolution code(CC) of code rate 1/2 as a forward error correction (FEC) in Quadrature Phase Shift Keying (QPSK) is applied to decrease bit error rate (BER) by background noise and multipath in shallow water acoustic channel. Ratio of transmitting signal bandwidth to channel coherence bandwidth is defined as frequency selectivity index. BER and bit energy-to-noise ratio gain of transmitted signal according to frequency selectivity index are evaluated. In the results of indoor water tank experiment, BER is well matched theoretical results at frequency selectivity index less than about 1.0. And bit energy-to-noise ratio gain is also matched theoretical value of 5 dB. BER is effectively decreased at frequency selective multipath channel with frequency selectivity index higher than 1.0. But bit energy-to-noise ratio greater than a certain size in terms of CC weaving is effective in reducing bit errors. In the results, the defined frequency selectivity index in this study could be applied to evaluate a performance of CC in multipath channel. Also it could effectively reduced BER in a low speed underwater acoustic communication system without an equalizer.

Performance Analysis of a Receiver for WCDMA Systems (광대역 코드분할 다중화 시스템 수신기의 성능 분석)

  • 박중후
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.6
    • /
    • pp.87-93
    • /
    • 2001
  • As a new type of a linear decorrelating receiver, the Pseudo-Decorrelator was presented for asynchronous code division multiple access systems by the author. In this paper, the concept of the Pseudo-Decorrelator is extended to derive a receiver for WCDMA uplink systems over an additive white Gaussian noise channel. Starting with the analysis of the multiple access components of the decision statistics, a non-square cross-correlation matrix for each bit is obtained. This cross-correlation matrix is then inverted, and the inverted matrix is applied to the decision statistics obtained from a conventional receiver. In this receiver, the detection process can be started after the first three consecutive bits are received. Simulation results are presented for K-user systems over an additive white Gaussian noise channel under the circumstances in which synchronization errors, including time delay errors and carrier phase errors exist. It is shown that the proposed receiver performs better than a conventional receiver and parallel interference canceller.

  • PDF

Error Resilient Scheme in Video Data Transmission using Information Hiding (정보은닉을 이용한 동영상 데이터의 전송 오류 보정)

  • Bae, Chang-Seok;Choe, Yoon-Sik
    • The KIPS Transactions:PartB
    • /
    • v.10B no.2
    • /
    • pp.189-196
    • /
    • 2003
  • This paper describes an error resilient video data transmission method using information hiding. In order to localize transmission errors in receiver, video encoder embeds one bit for a macro block during encoding process. Embedded information is detected during decoding process in the receiver, and the transmission errors can be localized by comparing the original embedding data. The localized transmission errors can be easily corrected, thus the degradation in a reconstructed image can be alleviated. Futhermore, the embedded information can be applied to protect intellectual property rights of the video data. Experimental results for 3 QCIF sized video sequenced composed of 150 frames respectively show that, while degradation in video streams in which the information is embedded is negligible, especially in a noisy channel, the average PSNR of reconstructed images can be improved about 5 dB by using embedded information. Also, intellectual property rights information can be effectively obtained from reconstructed images.

Prediction-based Reversible Data Hiding Using Empirical Histograms in Images

  • Weng, Chi-Yao;Wang, Shiuh-Jeng;Liu, Jonathan;Goyal, Dushyant
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1248-1266
    • /
    • 2012
  • This paper presents a multilevel reversible data hiding method based on histogram shifting which can recover the original image losslessly after the hidden data has been extracted from the stego-image. The method of prediction is adopted in our proposed scheme and prediction errors are produced to explore the similarity of neighboring pixels. In this article, we propose two different predictors to generate the prediction errors, where the prediction is carried out using the center prediction method and the JPEG-LS median edge predictor (MED) to exploit the correlation among the neighboring pixels. Instead of the original image, these prediction errors are used to hide the secret information. Moreover, we also present an improved method to search for peak and zero pairs and also talk about the analogy of the same to improve the histogram shifting method for huge embedding capacity and high peak signal-to-noise ratio (PSNR). In the one-level hiding, our method keeps image qualities larger than 53 dB and the ratio of embedding capacity has 0.43 bpp (bit per pixel). Besides, the concept with multiple layer embedding procedure is applied for obtaining high capacity, and the performance is demonstrated in the experimental results. From our experimental results and analytical reasoning, it shows that the proposed scheme has higher PSNR and high data embedding capacity than that of other reversible data hiding methods presented in the literature.

A Study on an Error Correction Code Circuit for a Level-2 Cache of an Embedded Processor (임베디드 프로세서의 L2 캐쉬를 위한 오류 정정 회로에 관한 연구)

  • Kim, Pan-Ki;Jun, Ho-Yoon;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.15-23
    • /
    • 2009
  • Microprocessors, which need correct arithmetic operations, have been the subject of in-depth research in relation to soft errors. Of the existing microprocessor devices, the memory cell is the most vulnerable to soft errors. Moreover, when soft errors emerge in a memory cell, the processes and operations are greatly affected because the memory cell contains important information and instructions about the entire process or operation. Users do not realize that if soft errors go undetected, arithmetic operations and processes will have unexpected outcomes. In the field of architectural design, the tool that is commonly used to detect and correct soft errors is the error check and correction code. The Itanium, IBM PowerPC G5 microprocessors contain Hamming and Rasio codes in their level-2 cache. This research, however, focuses on huge server devices and does not consider power consumption. As the operating and threshold voltage is currently shrinking with the emergence of high-density and low-power embedded microprocessors, there is an urgent need to develop ECC (error check correction) circuits. In this study, the in-output data of the level-2 cache were analyzed using SimpleScalar-ARM, and a 32-bit H-matrix for the level-2 cache of an embedded microprocessor is proposed. From the point of view of power consumption, the proposed H-matrix can be implemented using a schematic editor of Cadence. Therefore, it is comparable to the modified Hamming code, which uses H-spice. The MiBench program and TSMC 0.18 um were used in this study for verification purposes.

Interpretation of the Umbrella Clause in Investment Treaties (국제투자조약상 포괄적 보호조항(Umbrella Clauses)의 해석에 관한 연구)

  • Jo, Hee-Moon
    • Journal of Arbitration Studies
    • /
    • v.19 no.2
    • /
    • pp.95-126
    • /
    • 2009
  • One of the controversial issues in investor-state investment arbitration is the interpretation of "umbrella clause" that is found in most BIT and FTAs. This treaty clause requires on Contracting State of treaty to observe all investment obligations entered into with foreign investors from the other Contracting State. This clause did not receive in-depth attention until SGS v. Pakistan and SGS v. Philippines cases produced starkly different conclusions on the relations about treaty-based jurisdiction and contract-based jurisdiction. More recent decisions by other arbitral tribunals continue to show different approaches in their interpretation of umbrella clauses. Following the SGS v. Philippines decision, some recent decisions understand that all contracts are covered by umbrella clause, for example, in Siemens A.G. v. Argentina, LG&E Energy Corp. v. Argentina, Sempra Energy Int'l v. Argentina and Enron Corp. V. Argentina. However, other recent decisions have found a different approach that only certain kinds of public contracts are covered by umbrella clauses, for example, in El Paso Energy Int'l Co. v. Argentina, Pan American Energy LLC v. Argentina and CMS Gas Transmission Co. v. Argentina. With relation to the exhaustion of domestic remedies, most of tribunals have the position that the contractual remedy should not affect the jurisdiction of BIT tribunal. Even some tribunals considered that there is no need to exhaust contract remedies before bringing BIT arbitration, provoking suspicion of the validity of sanctity of contract in front of treaty obligation. The decision of the Annulment Committee In CMS case in 2007 was an extraordinarily surprising one and poured oil on the debate. The Committee composed of the three respected international lawyers, Gilbert Guillaume and Nabil Elaraby, both from the ICJ, and professor James Crawford, the Rapportuer of the International Law Commission on the Draft Articles on the Responsibility of States for Internationally Wrongful Acts, observed that the arbitral tribunal made critical errors of law, however, noting that it has limited power to review and overturn the award. The position of the Committee was a direct attack on ICSID system showing as an internal recognition of ICSID itself that the current system of investor-state arbitration is problematic. States are coming to limit the scope of umbrella clauses. For example, the 2004 U.S. Model BIT detailed definition of the type of contracts for which breach of contract claims may be submitted to arbitration, to increase certainty and predictability. Latin American countries, in particular, Argentina, are feeling collectively victims of these pro-investor interpretations of the ICSID tribunals. In fact, BIT between developed and developing countries are negotiated to protect foreign investment from developing countries. This general characteristic of BIT reflects naturally on the provisions making them extremely protective for foreign investors. Naturally, developing countries seek to interpret restrictively BIT provisions, whereas developed countries try to interpret more expansively. As most of cases arising out of alleged violation of BIT are administered in the ICSID, a forum under the auspices of the World Bank, these Latin American countries have been raising the legitimacy deficit of the ICSID. The Argentine cases have been provoking many legal issues of international law, predicting crisis almost coming in actual investor-state arbitration system. Some Latin American countries, such as Bolivia, Venezuela, Ecuador, Argentina, already showed their dissatisfaction with the ICSID system considering withdrawing from it to minimize the eventual investor-state dispute. Thus the disagreement over umbrella clauses in their interpretation is becoming interpreted as an historical reflection on the continued tension between developing and developed countries on foreign investment. There is an academic and political discussion on the possible return of the Calvo Doctrine in Latin America. The paper will comment on these problems related to the interpretation of umbrella clause. The paper analyses ICSID cases involving principally Latin American countries to identify the critical legal issues arising between developing and developed countries. And the paper discusses alternatives in improving actual investor-State investment arbitration; inter alia, the introduction of an appellate system and treaty interpretation rules.

  • PDF

Adaptive Closed-Loop Power Control Algorithm in DS/CDMA system (DS/CDMA 시스템의 적응형 폐쇄루프 전력 제어 알고리즘)

  • 감두열;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.383-390
    • /
    • 2000
  • In this paper, an adaptive power control algorithm in the DS/CDMA system is proposed. The currently used transmitter/receiver based on IS-95 and the radio propagation channel under mobile communication environments are modeled. Theses are the key features for the simulation to analyse the performance of power control. the distribution of the received SIR(signal to interference ratio)and the bit error probability are the required parameters for the performance analysis. Furthermore the influence of the power control command error on the above parameters are analyzed. By using the performance analysis of IS-95 and the occurrence of burst errors that is characteristic for wireless channels. the new power control algorithm is proposed. The proposed power control algorithm increases the SIR which results in a better service quality and an enhancement in the system capacity.

  • PDF