• Title/Summary/Keyword: Convergence technique

Search Result 2,430, Processing Time 0.026 seconds

A Study on BER Performance Improvement by using Adaptive FEC schemes in Visible Light Communication (백색 LED기반 가시광 통신시스템의 선택적 FEC 적용을 통한 BER 성능 향상에 관한 연구)

  • Kim, Kyun-Tak;Yun, Suck-Chang
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.99-106
    • /
    • 2016
  • In this paper, we propose an adaptive FEC scheme in visible light communication using white LED. To this end, we investigate the red, green and blue mixing ratio of white LED in order to achieve the white color, and the mixing ratio of those wavelength can be defined as 4 types. Based on those properties, the FEC technique is applied to the wavelength band with the lowest mixing ratio according to mixing ratio types. At that point, we use a LDPC channel coding scheme as the FEC technique. Therefore, the proposed system can mitigate the reduction of data rate and improve total BER performance.

Subband Affine Projection Adaptive Filter using Variable Step Size and Pipeline Transform (가변 적응상수와 파이프라인 변환을 이용한 부밴드 인접투사 적응필터)

  • Choi, Hun;Ha, Hong-Gon;Bae, Hyeon-Deok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.104-110
    • /
    • 2009
  • In this paper, we suggest a new technique which employ the pipelined architecture for the implementation of the SAP adaptive filter using variable step size. According as SAP adaptive filter is sufficiently decomposed, a simplified SAP adaptive filter can be derived, and the weights of adaptive sub-filters can be updated by a simple formular without a matrix inversion. The convergence speed and the steady state error of the simplified SAP adaptive filter are improved by using variable step size. For practical implementation, the simplified SAP adaptive sub-filters are transformed by the pipeline technique.

Authentication Scheme using Biometrics in Intelligent Vehicle Network (지능형 자동차 내부 네트워크에서 생체인증을 이용한 인증기법)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2013
  • Studies on the intelligent vehicles that are fused with IT and intelligent vehicle technologies are currently under active discussion. And many new service models for them are being developed. As intelligent vehicles are being actively developed, a variety of wireless services are support. As such intelligent vehicles use wireless network, they are exposed to the diverse sources of security risk. This paper aims to examine the factors to threaten intelligent vehicle, which are usually intruded through network system and propose the security solution using biometric authentication technique. The proposed security system employs biometric authentication technique model that can distinguish the physical characteristics of user.

Cost-Effective Transition to 40 Gb/s Line Rate Using the Existing 10 Gb/s-Based DWDM Infrastructure

  • Lee, Sang-Soo;Cho, Hyun-Woo;Lim, Sang-Kyu;Lee, Dong-Soo;Yoon, Kyeong-Mo;Lee, Yong-Gi;Kim, Kwang-Joon;Ko, Je-Soo
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.261-267
    • /
    • 2008
  • In this paper, we propose and demonstrate a cost-effective technique to upgrade the capacity of dense wavelength division multiplexing (DWDM) networks to a 40 Gb/s line rate using the existing 10 Gb/s-based infrastructure. To accommodate 40 Gb/s over the link optimized for 10 Gb/s, we propose applying a combination of super-FEC, carrier-suppressed return-to-zero, and pre-emphasis to the 40 Gb/s transponder. The transmission of 40 Gb/s DWDM channels over existing 10 Gb/s line-rate long-haul DWDM links, including $40{\times}40$ Gb/s transmission over KT's standard single-mode fiber optimized for 10 Gb/s achieves successful results. The proposed upgrading technique allows the Q-value margin for a 40 Gb/s line rate to be compatible with that of 10 Gb/s.

  • PDF

Fault Detection Algorithm of Photovoltaic Power Systems using Stochastic Decision Making Approach (확률론적 의사결정기법을 이용한 태양광 발전 시스템의 고장검출 알고리즘)

  • Cho, Hyun-Cheol;Lee, Kwan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.212-216
    • /
    • 2011
  • Fault detection technique for photovoltaic power systems is significant to dramatically reduce economic damage in industrial fields. This paper presents a novel fault detection approach using Fourier neural networks and stochastic decision making strategy for photovoltaic systems. We achieve neural modeling to represent its nonlinear dynamic behaviors through a gradient descent based learning algorithm. Next, a general likelihood ratio test (GLRT) is derived for constructing a decision malling mechanism in stochastic fault detection. A testbed of photovoltaic power systems is established to conduct real-time experiments in which the DC power line communication (DPLC) technique is employed to transfer data sets measured from the photovoltaic panels to PC systems. We demonstrate our proposed fault detection methodology is reliable and practicable over this real-time experiment.

Digital Holographic microscopy based on phase shifting technique (위상천이가법에 의한 디지털 홀로그래피 마이크로스코피에 관한 연구)

  • Park, Kwang-Hee;Chai, Pyung-Seak;Eun, Jae-Jeang
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.181-187
    • /
    • 2011
  • In this thesis, digital in-line holographic microscopy has been implemented with enhanced phase shifting technique. It was demonstrated that the zero-order diffraction noise and the twin image can be eliminated by phase-shifting interferometry very effectively. Also the experimental and numerical reconstruction has been incorporated into one set-up operating in real time. Experimental results and the analysis of the phase map indicate that the proposed system can be very useful for the measurement of microscopic objects and 3-D microscopy.

The Expressive Characteristics of Origami Fashion based on Functionality (기능성이 반영된 오리가미 패션의 표현특성)

  • Choi, Jung-Hwa;Choi, Yoo-Jin
    • Fashion & Textile Research Journal
    • /
    • v.11 no.4
    • /
    • pp.515-526
    • /
    • 2009
  • From traditional ceremony to science technology, origami was used as technique for artistic creativity and functionality based on formative characteristics. The purpose of this study is to analyze the expressive characteristics of functionality in fashion design using origami technique. The method of this study was to analyze recent documentaries, fashion books, fashion magazines, internet web site and so forth. The results were as follows: In various fields of design, the category of the expressive characteristics was classified as efficient correspondence of space, compositive convergence of function, variable potentiality of form and human ergonomic optimum. In recent origami fashion based on functionality, the efficient correspondence of space was expressed constructive or decorative pocket design, using on clothing surface and varied design by lifestyle. The compositive convergence of function was expressed innovative connection of fashion items or non-fashion items and deconstructed classical clothing pattern. The variable potentiality of form was expressed control of form by irregular fold, dynamic metamorphosis by organic fold and creation of varied clothing silhouette. The human ergonomic optimum was expressed metamorphosis mechanism from two dimension to three dimension, suitable construction to physical ability and limit and organic form based on articular folding. The functional origami fashion means reflection of nomadic lifestyle, maximum of usability, pursuit of playful sensibility, creation of new body aesthetic and pursuit of technology and humanism. And the result of these study may be used for creative inspiration in fashion design because of unique characteristics.

An Information Security Levelling Toll using Fuzzy Technique (퍼지기법을 이용한 보안수준 측정 도구)

  • Sung, Kyung;Choi, Sang-Yong;So, Woo-Young
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.123-135
    • /
    • 2002
  • As the development of information technology and thus the growth of security incidents, there has been increasing demand on developing methodologies and tools for measuring the information security level of organizations for the efficient security management. However, most works from foreign countries are not realistic in constructing the checklists, moreover their tools provide neither the ease of use nor the inexpensiveness, and most domestic works are not properly considering the characteristics of the organizations when measuring the information security level. In this study, an efficient information security levelling tool is suggested, which applies the multiple variable weights for security levelling according to the characteristics of organizations and the fuzzy technique to reduce the user's subjectivity.

  • PDF

A Study on Website Forgery/Falsification Detection Technique using Images (이미지를 이용한 웹사이트 위·변조 탐지 기법 연구)

  • Shin, JiYong;Cho, Jiho;Lee, Han;Kim, JeongMin;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • In this paper, we propose a forgery/falsification detection technique of web site using the images. The proposed system captures images of the web site when a user accesses to the forgery/falsification web site that has the financial information deodorizing purpose. The captured images are compared with those of normal web site images to detect forgery/falsification. The proposed system calculates similarity factor of normal site image with captured one to detect whether the site is normal or not. If it is determined as normal, analysis procedure is finished. But if it is determined as abnormal, a message informs the user to prevent additional financial information spill and further accidents from the forgery web site.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF