• Title/Summary/Keyword: Bit errors

Search Result 314, Processing Time 0.029 seconds

Design and Implementation of ASTERIX Parsing Module Based on Pattern Matching for Air Traffic Control Display System (항공관제용 현시시스템을 위한 패턴매칭 기반의 ASTERIX 파싱 모듈 설계 및 구현)

  • Kim, Kanghee;Kim, Hojoong;Yin, Run Dong;Choi, SangBang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.89-101
    • /
    • 2014
  • Recently, as domestic air traffic dramatically increases, the need of ATC(air traffic control) systems has grown for safe and efficient ATM(air traffic management). Especially, for smooth ATC, it is far more important that performance of display system which should show all air traffic situation in FIR(Flight Information Region) without additional latency is guaranteed. In this paper, we design a ASTERIX(All purpose STructured Eurocontrol suRveillance Information eXchange) parsing module to promote stable ATC by minimizing system loads, which is connected with reducing overheads arisen when we parse ASTERIX message. Our ASTERIX parsing module based on pattern matching creates patterns by analyzing received ASTERIX data, and handles following received ASTERIX data using pre-defined procedure through patterns. This module minimizes display errors by rapidly extracting only necessary information for display different from existing parsing module containing unnecessary parsing procedure. Therefore, this designed module is to enable controllers to operate stable ATC. The comparison with existing general bit level ASTERIX parsing module shows that ASTERIX parsing module based on pattern matching has shorter processing delay, higher throughput, and lower CPU usage.

Communication performance analysis of unmanned aerial vehicle by Doppler frequency (도플러 주파수에 의한 무인 비행체의 통신 성능 분석)

  • Lee, Hee-Kwon;Youm, Sung-Kwan;Kim, Yong-Kab
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.612-618
    • /
    • 2019
  • In the unmanned vehicle industry, the market is exploding due to the rapid development of public and private demands along with the technological development of the 4th Industrial Revolution. In addition, unmanned mobiles are being used for communication services. In this paper, we analyzed the communication performance of unmanned aerial vehicle according to the characteristics of Doppler frequency. The Doppler frequency was calculated using the geometric model of the unmanned aerial vehicle, and the Doppler frequency of 10km, 30km, 300km, 1000km per hour and the BER performance by AWGN were measured by considering the unmanned high speed unmanned vehicle based on the position of the controller. The Doppler frequency model uses a Dent model and adds additive white Gaussian noise (AWGN) to check the bit errors of the transmitter and receiver. Low speed unmanned vehicles generally exhibited a BER performance of 0.2, while high speed unmanned vehicles generally exhibited a BER performance of 0.06. As the frequency band increases at the same speed, the BER performance increases, and when the speed increases in the same frequency band, the BER performance decreases. This is confirmed by the simulation results to predict theoretically predictable BER performance. In the frequency bands of 2.6 GHz, 5 GHz, and 28 GHz, the BER characteristics by Doppler frequency and the BER characteristics by controller function are verified. effect was confirmed.

Effect of frequency dependent multipath fading on non-coherent underwater communication system (주파수 종속 다중경로 페이딩이 비코히어런트 수중통신시스템에 미치는 영향)

  • Kim, Jongjoo;Park, Jihyun;Bae, Minja;Park, Kyu-Chil;Yoon, Jong Rak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.35 no.4
    • /
    • pp.295-302
    • /
    • 2016
  • Underwater acoustic communication channel is often defined as a multipath fading channel since the multipath arrivals from various paths interfere with each other and cause frequency dependent constructive or destructive interference in received signals. Therefore signal-to-noise ratio (SNR) of received signal fluctuates as a function of frequency. In addition, sea surface fluctuation induces frequency dependent time variant signal fading due to coherent component variation of surface bounce path. The frequency shift keying (FSK) system is known to be less sensitive and more robust under these interference and fading, and M-ary frequency shift keying (MFSK) system is adopted to increase a data rate. In this study, a bit error rate (BER) of 4 channels 4FSK system are examined in shallow sea multipath channel. Experimental results show that RS code reduces efficiently the BER of 4FSK system since frequency dependent time-varying fading is characterized to give burst errors. The BER of a different data rate or different source-to-receiver range depends on not only the channel coherent bandwidth but also frequency dependent multipath fading.

A Study on the Correlation Results for Fringe Rotation and Delay Tracking of the VCS (VCS의 지연추적과 프린지 회전에 대한 상관결과 고찰)

  • Oh, Se-Jin;Yeom, Jae-Hwan;Roh, Duk-Gyoo;Oh, ChungSik;Jung, Jin-Seung;Chung, Dong-Kyu;Oyama, Tomoaki;Kawaguchi, Noriyuki;Kobayashi, Hideyuki;Kono, Yusuke;Ozeki, Kensuke;Onuki, Hirohumi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.220-232
    • /
    • 2012
  • In this paper, we investigate the correlation result due to the problems of delay tracking and fringe rotation module in the VCS(VLBI Correlation Subsystem). The VCS, FX-type correlator, adopts the delay tracking and fringe rotation module in order to compensate the delay change and fringe phase of wave signal from the radio source by Doppler's effect. The phase of observed data is also compensated by means of delay tracking and fringe rotation in the correlator, but we confirmed that the phase is unstable by applying long integration period of AIPS(Astronomical Image Processing System) rather than correlator. And the delay value of observed data has the errors of several tens nanoseconds than normal case at the analysis of correlation result. In addition, we found that the phase of correlation results is not connected as the unit of FFT-segment because the initial fringe phase at the fringe rotation module is not correctly determined. In this paper, in order to solve these problems, the original direction of 90 degree phase jump is reversely modified when the bit-shift occurred at the delay tracking. And the initial fringe phase at the fringe rotation module is correctly modified by using the initial phase of observed data. In addition, the parameter calculation module was abnormally operated as designed in the fringe rotation. So, the logical program by the VCS is modified so as to calculate the parameters correctly. Through the experiments of correlation processing over the above problems, the modified proposal algorithm is adequately corrected to the data analysis results, so that the experimental results make it clear for us to operate the developed VCS hardware correlator normally.

Fast Median Filtering Algorithms for Real-Valued 2-dimensional Data (실수형 2차원 데이터를 위한 고속 미디언 필터링 알고리즘)

  • Cho, Tai-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2715-2720
    • /
    • 2014
  • Median filtering is very effective to remove impulse type noises, so it has been widely used in many signal processing applications. However, due to the time complexity of its non-linearity, median filtering is often used using a small filter window size. A lot of work has been done on devising fast median filtering algorithms, but most of them can be efficiently applied to input data with finite integer values like images. Little work has been carried out on fast 2-d median filtering algorithms that can deal with real-valued 2-d data. In this paper, a fast and simple median 2-d filter is presented, and its performance is compared with the Matlab's 2-d median filter and a heap-based 2-d median filter. The proposed algorithm is shown to be much faster than the Matlab's 2-d median filter and consistently faster than the heap-based algorithm that is much more complicated than the proposed one. Also, a more efficient median filtering scheme for 2-d real valued data with a finite range of values is presented that uses higher-bit integer 2-d median filtering with negligible quantization errors.

Analysis of Block FEC Symbol Size's Effect On Transmission Efficiency and Energy Consumption over Wireless Sensor Networks (무선 센서 네트워크에서 전송 효율과 에너지 소비에 대한 블록 FEC 심볼 크기 영향 분석)

  • Ahn, Jong-Suk;Yoon, Jong-Hyuk;Lee, Young-Su
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.803-812
    • /
    • 2006
  • This paper analytically evaluates the FEC(Forward Error Correction) symbol size's effect on the performance and energy consumption of 802.11 protocol with the block FEC algorithm over WSN(Wireless Sensor Network). Since the basic recovery unit of block FEC algorithms is symbols not bits, the FEC symbol size affects the packet correction rate even with the same amount of FEC check bits over a given WSN channel. Precisely, when the same amount of FEC check bits are allocated, the small-size symbols are effective over channels with frequent short bursts of propagation errors while the large ones are good at remedying the long rare bursts. To estimate the effect of the FEC symbol site, the paper at first models the WSN channel with Gilbert model based on real packet traces collected over TIP50CM sensor nodes and measures the energy consumed for encoding and decoding the RS (Reed-Solomon) code with various symbol sizes. Based on the WSN channel model and each RS code's energy expenditure, it analytically calculates the transmission efficiency and power consumption of 802.11 equipped with RS code. The computational analysis combined with real experimental data shows that the RS symbol size makes a difference of up to 4.2% in the transmission efficiency and 35% in energy consumption even with the same amount of FEC check bits.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Daily Setup Uncertainties and Organ Motion Based on the Tomoimages in Prostatic Radiotherapy (전립선암 치료 시 Tomoimage에 기초한 Setup 오차에 관한 고찰)

  • Cho, Jeong-Hee;Lee, Sang-Kyu;Kim, Sei-Joon;Na, Soo-Kyung
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.19 no.2
    • /
    • pp.99-106
    • /
    • 2007
  • Purpose: The patient's position and anatomy during the treatment course little bit varies to some extend due to setup uncertainties and organ motions. These factors could affected to not only the dose coverage of the gross tumor but over dosage of normal tissue. Setup uncertainties and organ motions can be minimized by precise patient positioning and rigid immobilization device but some anatomical site such as prostate, the internal organ motion due to physiological processes are challenge. In planning procedure, the clinical target volume is a little bit enlarged to create a planning target volume that accounts for setup uncertainties and organ motion as well. These uncertainties lead to differences between the calculated dose by treatment planning system and the actually delivered dose. The purpose of this study was to evaluate the differences of interfractional displacement of organ and GTV based on the tomoimages. Materials and Methods: Over the course of 3 months, 3 patients, those who has applied rectal balloon, treated for prostatic cancer patient's tomoimage were studied. During the treatment sessions 26 tomoimages per patient, Total 76 tomoimages were collected. Tomoimage had been taken everyday after initial setup with lead marker attached on the patient's skin center to comparing with C-T simulation images. Tomoimage was taken after rectal balloon inflated with 60 cc of air for prostate gland immobilization for daily treatment just before treatment and it was used routinely in each case. The intrarectal balloon was inserted to a depth of 6 cm from the anal verge. MVCT image was taken with 5 mm slice thickness after the intrarectal balloon in place and inflated. For this study, lead balls are used to guide the registration between the MVCT and CT simulation images. There are three image fusion methods in the tomotherapy, bone technique, bone/tissue technique, and full image technique. We used all this 3 methods to analysis the setup errors. Initially, image fusions were based on the visual alignment of lead ball, CT anatomy and CT simulation contours and then the radiation therapist registered the MVCT images with the CT simulation images based on the bone based, rectal balloon based and GTV based respectively and registered image was compared with each others. The average and standard deviation of each X, Y, Z and rotation from the initial planning center was calculated for each patient. The image fusions were based on the visual alignment of lead ball, CT anatomy and CT simulation contours. Results: There was a significant difference in the mean variations of the rectal balloon among the methods. Statistical results based on the bone fusion shows that maximum x-direction shift was 8 mm and 4.2 mm to the y-direction. It was statistically significant (P=<0.0001) in balloon based fusion, maximum X and Y shift was 6 mm, 16mm respectively. One patient's result was more than 16 mm shift and that was derived from the rectal expansions due to the bowl gas and stool. GTV based fusion results ranging from 2.7 to 6.6 mm to the x-direction and 4.3$\sim$7.8 mm to the y-direction respectively. We have checked rotational error in this study but there are no significant differences among fusion methods and the result was 0.37$\pm$0.36 in bone based fusion and 0.34$\pm$0.38 in GTV based fusion.

  • PDF

INVESTIGATION OF THE EFFECT OF AN ANTIBIOTIC "P" ON POTATOES ("감자에 대한 항생제(抗生劑) 피마리신의 통계적(統計的) 효과(效果) 분석(分析)")

  • Kim, Jong-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.5 no.2
    • /
    • pp.59-120
    • /
    • 1977
  • An antibiotic 'P', which is one of the products of the Gist Brocades N. V. is being tested by its research department as fungicide on seed-potatoes. For this testing they designed experiments, with two control groups, one competitor's product, eight formulations of the antibiotic to be tested in different concentrations and one mercury treatment which can not be used in practice. The treated potatoes were planted in three different regions, where bifferent conditions prevail. After several months the harvested potatoes are divided in groups according to their diameter, potato illness is analysed and counted. These data were summarised in percentage and given to us for Analysis. We approached and analysed the data by following methods: a. Computation of the mean and standard deviation of the percenage of good results in each size group and treatment. b. Computation of the experimental errors by substraction of each treatment mean from observed data. c. Description of the frequency table, plotting of a histogram and a normal curve on same graph to check normality. d. Test of normality paper and chi-sqeare test to check the goodness of fit to a normal curve. e. Test for homogeneity of variance in each treatment with the Cochran's test and Hartley's test. f. Analysis of Variance for testing the means by one way classifications. g. Drawing of graphs with upper and lower confidence limits to show the effect of different treatments. h. T-test and F-test to two Control mean and variance for making one control of Dunnett's test. i. Dunnett's Test and calculations for numerical comarision of different treatments wth one control. In region R, where the potatoes were planted, it was this year very dry and rather bad conditions to grow potatoes prevailed during the experimental period. The results of this investigation show us that treatment No.2, 3 and 4 are significantly different from other treatments and control groups (none treated, just like natural state). Treatment no.2 is the useless mercury formulation. So only No. 3 and 4, which have high concentrations of antibiotic 'P', gave a good effect to the potatoes. As well as the competitors product, middle and low concentrated formulations are not significantly different from control gro-ups of every size. In region w, where the potatoes got the same treatments as in region R, prevailed better weather conditions and was enough water obtainable from the lake. The results in this region showed that treatment No. 2, 3, 4, and 5 are Significantly different from other treatments and the control groups. Again No.2 is the mercury treatmentin this investigation. Not only high concentrated formulation of antibiotic 'P', but also the competitor's poroduct gave good results. But, the effect of 'P', was better than the competitors porduct. In region G, where the potatoes got the same treatments as in the regions R and w. and the climate conditions were equal to region R, the results showed that most of the treatments are not significantly different from the control groups. Only treatment no. 3 was a little bit different from the others. but not Significantly different. It seems to us that the difference between the results in the three regions was caused by certain conditions like, the nature of the soil the degres of moisture and hours of sunshine, but we are not sure of that. As a conclusion, we can say that antibiotic 'P' has a good effect on potatoes, but in most investigations a rather high concentration of 'P' was required in formulations.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.