• Title/Summary/Keyword: Discrete Signal

Search Result 629, Processing Time 0.024 seconds

Generalized Vector Channel Model for Communication Systems Using Antenna Arrays and Implementation of the Spatial Channel Simulator (안테나 배열을 사용하는 통신 시스템을 위한 일반화된 벡터 채널 모델과 공간 채널 시뮬레이터의 구현)

  • 오성근;류원형
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.408-422
    • /
    • 2000
  • In this paper, we propose a generalized vector channel model for wireless communication systems using antenna arrays. The proposed channel model reflects path loss. spatial-temporal variation of shadowing, multipath fading , Doppler effect, spatial distribution of local scatterers and delay spread due to remote dominant scatterers. In addition, we use a discrete ray model in which respective ray signal experiences independent shadowing, fading and Doppler shift, and impinges on antenna arrays at a distinct angle. Based on the proposed mode. we derive the relations on the spatial and temporal correlations of the received signals and implement a spatial channel simulator. By comparing the theoretical values with the simulated ones, we verify the effectiveness of the implemented simulator. The simulator is then used to generate an arbitrary channel impulse response and to analyze the channel characteristics under various environments.

  • PDF

Detection, Identification and Surveillance System Development of Illegal Fishing Vessels in Inshore Fishing Ground (연안 어장에서의 불법 조업 어선의 탐지, 식별 및 감시 시스템 개발)

  • LEE Dae-Jae;KIM Kwang-Sik
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.37 no.4
    • /
    • pp.337-344
    • /
    • 2004
  • A real-time surveillance system of the inshore fishing ground was constructed to identify and detect discrete targets, such as illegal fishing vessels. This paper describes measurements made with a combination of sensors, such as radar, CCTV camera, and GPS receivers, for monitoring the fishing activity of small vessels within the fishing limit zones of the inshore waters. The CCTV camera system was used to confirm detection and to classify the type of target. The location of legal vessels distributed in coastal waters was acquired from each GPS system of ships connected to commercial satellite communication network. The surveillance system was networked via LAN to one host PC with the use of electronic navigational charts (ENC) and a radar link. Radar Target Extractor (RTX) for radar signal processing can be remotely accessed and controlled on existing PC via the internet, from anywhere, at any time. Results are presented that demonstrate the effectiveness of the newly constructed fisheries monitoring system for conducting continuous surveillance of illegal fishing vessels in the inshore fishing ground. The identification of illegal fishing vessels was achieved by comparing radar positions of illegal fishing vessels exceeding the warning limits in the surveillance area with GPS position reports transmitted from legal fishing vessels, and the illegal fishing vessels were marked with red symbols on the ENC screen of a PC. The methods to track the activities of all vessels intruding or leaving the fishing limit zones also were discussed.

CA Joint Resource Allocation Algorithm Based on QoE Weight

  • LIU, Jun-Xia;JIA, Zhen-Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2233-2252
    • /
    • 2018
  • For the problem of cross-layer joint resource allocation (JRA) in the Long-Term Evolution (LTE)-Advanced standard using carrier aggregation (CA) technology, it is difficult to obtain the optimal resource allocation scheme. This paper proposes a joint resource allocation algorithm based on the weights of user's average quality of experience (JRA-WQOE). In contrast to prevalent algorithms, the proposed method can satisfy the carrier aggregation abilities of different users and consider user fairness. An optimization model is established by considering the user quality of experience (QoE) with the aim of maximizing the total user rate. In this model, user QoE is quantified by the mean opinion score (MOS) model, where the average MOS value of users is defined as the weight factor of the optimization model. The JRA-WQOE algorithm consists of the iteration of two algorithms, a component carrier (CC) and resource block (RB) allocation algorithm called DABC-CCRBA and a subgradient power allocation algorithm called SPA. The former is used to dynamically allocate CC and RB for users with different carrier aggregation capacities, and the latter, which is based on the Lagrangian dual method, is used to optimize the power allocation process. Simulation results showed that the proposed JRA-WQOE algorithm has low computational complexity and fast convergence. Compared with existing algorithms, it affords obvious advantages such as improving the average throughput and fairness to users. With varying numbers of users and signal-to-noise ratios (SNRs), the proposed algorithm achieved higher average QoE values than prevalent algorithms.

Mechanical properties and failure mechanisms of sandstone with pyrite concretions under uniaxial compression

  • Chen, Shao J.;Ren, Meng Z.;Wang, Feng;Yin, Da W.;Chen, Deng H.
    • Geomechanics and Engineering
    • /
    • v.22 no.5
    • /
    • pp.385-396
    • /
    • 2020
  • A uniaxial compression test was performed to analyse the mechanical properties and macroscale and mesoscale failure mechanisms of sandstone with pyrite concretions. The effect of the pyrite concretions on the evolution of macroscale cracks in the sandstone was further investigated through numerical simulations with Particle Flow Code in 2D (PFC2D). The results revealed that pyrite concretions substantially influence the mechanical properties and macroscale and mesoscale failure characteristics of sandstone. During the initial loading stage, significant stress concentrations occurred around the edges of the pyrite concretion accompanied by the preferential generation of cracks. Meanwhile, the events and cumulative energy counts of the acoustic emission (AE) signal increased rapidly because of friction sliding between the concretion and sandstone matrix. As the axial stress increased, the degree of the stress concentration remained relatively unchanged around the edges of the concretions. The cracks continued growing rapidly around the edges of the concretions and gradually expanded toward the centre of the sample. During this stage, the AE events and cumulative energy counts increased quite slowly. As the axial stress approached the peak strength of the sandstone, the cracks that developed around the edges of the concretion started to merge with cracks that propagated at the top-left and bottom-right corners of the sample. This crack evolution ultimately resulted in the shear failure of the sandstone sample around the edges of the pyrite concretions.

The Study of Industrial Trends in Power Semiconductor Industry (전력용반도체 산업분석 및 시사점)

  • Chun, Hwang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.845-848
    • /
    • 2009
  • Power semiconductor devices are semiconductor devices used as switches or rectifiers in power electronics circuits. Theyare also caleed power devices or when used in integrated circuits, called power ICs. Some common power devices are the power diode, thyristor, power MOSFET and IGBT (insulated gate bipolar transistor). A power diode or MOSFET operates on similar principles to its low-power counterpart, but is able to carry a larger amount of current and typically is able to support a larger reverse-bias voltage in the off-state. Structural changes are often made in power devices to accommodate the higher current density, higher power dissipation and/or higher reverse breakdown voltage. The vast majority of the discrete (i.e non integrated) power devices are built using a vertical structure, whereas small-signal devices employ a lateral structure. With the vertical structure, the current rating of the device is proportional to its area, and the voltage blocking capability is achieved in the height of the die. With this structure, one of the connections of the device is located on the bottom of the semiconductor.

  • PDF

Adaptive Wavelet Transform for Hologram Compression (홀로그램 압축을 위한 적응적 웨이블릿 변환)

  • Kim, Jin-Kyum;Oh, Kwan-Jung;Kim, Jin-Woong;Kim, Dong-Wook;Seo, Young-Ho
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.143-154
    • /
    • 2021
  • In this paper, we propose a method of compressing digital hologram standardized data provided by JPEG Pleno. In numerical reconstruction of digital holograms, the addition of random phases for visualization reduces speckle noise due to interference and doubles the compression efficiency of holograms. Holograms are composed of completely complex floating point data, and due to ultra-high resolution and speckle noise, it is essential to develop a compression technology tailored to the characteristics of the hologram. First, frequency characteristics of hologram data are analyzed using various wavelet filters to analyze energy concentration according to filter types. Second, we introduce the subband selection algorithm using energy concentration. Finally, the JPEG2000, SPIHT, H.264 results using the Daubechies 9/7 wavelet filter of JPEG2000 and the proposed method are used to compress and restore, and the efficiency is analyzed through quantitative quality evaluation compared to the compression rate.

Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method (연속 웨이블릿 변환을 사용한 비프로파일링 기반 전력 분석 공격)

  • Bae, Daehyeon;Lee, Jaewook;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1127-1136
    • /
    • 2021
  • In the field of power analysis attacks, electrical noise and misalignment of the power consumption trace are the major factors that determine the success of the attack. Therefore, several studies have been conducted to overcome this problem, and one of them is a signal processing method based on wavelet transform. Up to now, discrete wavelet transform, which can compress the trace, has been mostly used for power side-channel power analysis because continuous wavelet transform techniques increase data size and analysis time, and there is no efficient scale selection method. In this paper, we propose an efficient scale selection method optimized for power analysis attacks. Furthermore, we show that the analysis performance can be greatly improved when using the proposed method. As a result of the CPA(Correlation Power Analysis) and DDLA(Differential Deep Learning Analysis) experiments, which are non-profiling attacks, we confirmed that the proposed method is effective for noise reduction and trace alignment.

Microcontroller based Chaotic Lorenz System for Secure Communication Applications (암호통신 응용을 위한 마이크로 컨트롤러 기반 로렌츠 카오스 시스템)

  • Jayawickrama, Chamindra;Song, Hanjung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1698-1704
    • /
    • 2018
  • This paper presents a implementation of a chaotic Lorenz system for data secure communication applications. Here we have used PIC18F family-based microcontroller to generate the chaotic signal, and simulated waveform patterns confirm that the chaotic behavior of the microcontroller based discrete time chaotic Lorenz system. There are three R-2R ladder type A/D converters have been implemented for conversion of direct microcontroller digital output into analog waveform, utilizing this specific microcontroller relevant to this experiment work, microcontroller ports B, C and D have been utilized for its time waveform outputs X, Y and Z respectively. XC8 compiler used for the compilation of the program. MATLAB and PROTEUS software platforms are used for simulation. Finally, chaotic time wave forms, 2D chaotic attractors were obtained and secure communication analog waveforms were also verified by experimental measurement.

A Case Study on MIL-STD-1760E based Test Bench Implementation for Aircraft-Weapon Interface Testing (항공기-무장간의 연동 시험을 위한 MIL-STD-1760E 기반 테스트 벤치 구축 사례 연구)

  • Kim, Tae-bok;Park, Ki-seok;Kim, Ji-hoon;Jung, Jae-won;Kwon, Byung-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.57-63
    • /
    • 2018
  • In the case of aircraft-launched guided weapons, various interface tests such as MIL-STD-1760 based power source, discrete signal, MUX communication as well as BIT of missile can verify system safety and reliability. The purpose of this case study is to develop a test bench based on MIL-STD-1760E for interoperability testing between aircraft and weapons. We proposed a testing method of the launch sequence based on the defined TIME LINE in the development phase of the missile system from the application of the power of the missile to the targeting, the transfer order, and the missile separation process. Furthermore, it will be a reference model that can maximize the verification scope in the development phase of the air to surface missile system by simulating abnormal situation to the inert missile using the error insertion function.

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.