• Title/Summary/Keyword: Discrete Signal

Search Result 632, Processing Time 0.03 seconds

A Case Study on MIL-STD-1760E based Test Bench Implementation for Aircraft-Weapon Interface Testing (항공기-무장간의 연동 시험을 위한 MIL-STD-1760E 기반 테스트 벤치 구축 사례 연구)

  • Kim, Tae-bok;Park, Ki-seok;Kim, Ji-hoon;Jung, Jae-won;Kwon, Byung-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.57-63
    • /
    • 2018
  • In the case of aircraft-launched guided weapons, various interface tests such as MIL-STD-1760 based power source, discrete signal, MUX communication as well as BIT of missile can verify system safety and reliability. The purpose of this case study is to develop a test bench based on MIL-STD-1760E for interoperability testing between aircraft and weapons. We proposed a testing method of the launch sequence based on the defined TIME LINE in the development phase of the missile system from the application of the power of the missile to the targeting, the transfer order, and the missile separation process. Furthermore, it will be a reference model that can maximize the verification scope in the development phase of the air to surface missile system by simulating abnormal situation to the inert missile using the error insertion function.

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Comparison of Scattered Light of ex vivo Mouse Neutrophils by Different Wavelength Laser Irradiation (2개의 레이저 파장에 따른 마우스 호중구의 산란광 비교 연구)

  • Park, Jae-Sung;Son, Min-Ji;Hwang, Chang-Soon;Lee, Ho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.3
    • /
    • pp.365-378
    • /
    • 2022
  • Complete blood cell count(CBC) is a technique that counts leukocytes for each type of blood cell being analyzed. The principle is that laser is incident to ex vivo flowing leukocytes in a microcapillary tube and scattered light occurs by laser and leukocytes. By collecting the scattered light, we can count the types of cells because different cells generate different light-scattering patterns. However, the technique has an intrinsic limitation, scattering pattern is shown in a wide range region in the resulting, which makes it difficult to accurate analyze and use fluorescent dyes. To overcome this limitation, a new design of CBC with a dual laser, which irradiates with orthogonal angles for collecting quad-scattering information was proposed. Before development, the scattering difference depending on wavelength must be investigated to only catch up to the scattered signal by angles. Some studies, which focused on simple particles, have been conducted to theoretically and experimentally investigate different scatterings by wavelength. In this study, we propose an optical system for measuring scattered light and investigate a complex particle. As a result, the green laser made strong scattering signals in both the forward and side direction: 10% and 30%, respectively.

Mel-Frequency Cepstral Coefficients Using Formants-Based Gaussian Distribution Filterbank (포만트 기반의 가우시안 분포를 가지는 필터뱅크를 이용한 멜-주파수 켑스트럴 계수)

  • Son, Young-Woo;Hong, Jae-Keun
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.8
    • /
    • pp.370-374
    • /
    • 2006
  • Mel-frequency cepstral coefficients are widely used as the feature for speech recognition. In FMCC extraction process. the spectrum. obtained by Fourier transform of input speech signal is divided by met-frequency bands, and each band energy is extracted for the each frequency band. The coefficients are extracted by the discrete cosine transform of the obtained band energy. In this Paper. we calculate the output energy for each bandpass filter by taking the weighting function when applying met-frequency scaled bandpass filter. The weighting function is Gaussian distributed function whose center is at the formant frequency In the experiments, we can see the comparative performance with the standard MFCC in clean condition. and the better Performance in worse condition by the method proposed here.

Real-time Fault Detection System of a Pneumatic Cylinder Via Deep-learning Model Considering Time-variant Characteristic of Sensor Data (센서 데이터의 시계열 특성을 고려한 딥러닝 모델 기반의 공압 실린더 고장 감지 시스템 구현)

  • Byeong Su Kim;Geun Myeong Song;Min Jeong Lee;Sujeong Baek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.47 no.2
    • /
    • pp.10-20
    • /
    • 2024
  • In recent automated manufacturing systems, compressed air-based pneumatic cylinders have been widely used for basic perpetration including picking up and moving a target object. They are relatively categorized as small machines, but many linear or rotary cylinders play an important role in discrete manufacturing systems. Therefore, sudden operation stop or interruption due to a fault occurrence in pneumatic cylinders leads to a decrease in repair costs and production and even threatens the safety of workers. In this regard, this study proposed a fault detection technique by developing a time-variant deep learning model from multivariate sensor data analysis for estimating a current health state as four levels. In addition, it aims to establish a real-time fault detection system that allows workers to immediately identify and manage the cylinder's status in either an actual shop floor or a remote management situation. To validate and verify the performance of the proposed system, we collected multivariate sensor signals from a rotary cylinder and it was successful in detecting the health state of the pneumatic cylinder with four severity levels. Furthermore, the optimal sensor location and signal type were analyzed through statistical inferences.

Performance Analysis of a Statistical Packet Voice/Data Multiplexer (통계적 패킷 음성 / 데이터 다중화기의 성능 해석)

  • 신병철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.3
    • /
    • pp.179-196
    • /
    • 1986
  • In this paper, the peformance of a statistical packet voice/data multiplexer is studied. In ths study we assume that in the packet voice/data multiplexer two separate finite queues are used for voice and data traffics, and that voice traffic gets priority over data. For the performance analysis we divide the output link of the multiplexer into a sequence of time slots. The voice signal is modeled as an (M+1) - state Markov process, M being the packet generation period in slots. As for the data traffic, it is modeled by a simple Poisson process. In our discrete time domain analysis, the queueing behavior of voice traffic is little affected by the data traffic since voice signal has priority over data. Therefore, we first analyze the queueing behavior of voice traffic, and then using the result, we study the queueing behavior of data traffic. For the packet voice multiplexer, both inpur state and voice buffer occupancy are formulated by a two-dimensional Markov chain. For the integrated voice/data multiplexer we use a three-dimensional Markov chain that represents the input voice state and the buffer occupancies of voice and data. With these models, the numerical results for the performance have been obtained by the Gauss-Seidel iteration method. The analytical results have been verified by computer simylation. From the results we have found that there exist tradeoffs among the number of voice users, output link capacity, voic queue size and overflow probability for the voice traffic, and also exist tradeoffs among traffic load, data queue size and oveflow probability for the data traffic. Also, there exists a tradeoff between the performance of voice and data traffics for given inpur traffics and link capacity. In addition, it has been found that the average queueing delay of data traffic is longer than the maximum buffer size, when the gain of time assignment speech interpolation(TASI) is more than two and the number of voice users is small.

  • PDF

An Effective Method to Treat The Boundary Pixels for Image Compression with DWT (DWT를 이용한 영상압축을 위한 경계화소의 효과적인 처리방법)

  • 서영호;김종현;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.618-627
    • /
    • 2002
  • In processing images using 2 dimensional Discrete Wavelet Transform(2D-DWT), the method to process the pixels around the image boundary may affect the quality of image and the cost to implement in hardware and software. This paper proposed an effective method to treat the boundary pixels, which is apt to implement in hardware and software without losing the quality of the image costly. This method processes the 2-D image as 1-D array so that 2-D DWT is performed by considering the image with the serial-sequential data structure (Serial-Sequential Processing). To show the performance and easiness in implementation of the proposed method, an image compression codec which compresses image and reconstructs it has been implemented and experimented. It included log-scale fried quantizer, but the entropy coder was not implemented. From the experimental results, the proposed method showed the SNR of almost the same SNR(Signal to Noise Ratio) to the Periodic Expansion(PE) method when the compression ratio(excluding entropy coding) of 2:1, 15.3% higher than Symmetric Expansion(SE) method, and 9.3% higher than 0-pixel Padding Expansion(ZPE) method. Also PE method needed 12.99% more memory space than the proposed method. By considering only the compression process, SE and ZPE methods needed additional operations than the proposed one. In hardware implementation, the proposed method in this paper had 5.92% of overall circuit as the control circuit, while SE, PE, and ZPE method has 22%, 21,2%, and 11.9% as the control circuit, respectively. Consequently, the proposed method can be thought more effective in implementing software and hardware without losing any image quality in the usual image processing applications.

Speech Recognition Using Linear Discriminant Analysis and Common Vector Extraction (선형 판별분석과 공통벡터 추출방법을 이용한 음성인식)

  • 남명우;노승용
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.35-41
    • /
    • 2001
  • This paper describes Linear Discriminant Analysis and common vector extraction for speech recognition. Voice signal contains psychological and physiological properties of the speaker as well as dialect differences, acoustical environment effects, and phase differences. For these reasons, the same word spelled out by different speakers can be very different heard. This property of speech signal make it very difficult to extract common properties in the same speech class (word or phoneme). Linear algebra method like BT (Karhunen-Loeve Transformation) is generally used for common properties extraction In the speech signals, but common vector extraction which is suggested by M. Bilginer et at. is used in this paper. The method of M. Bilginer et al. extracts the optimized common vector from the speech signals used for training. And it has 100% recognition accuracy in the trained data which is used for common vector extraction. In spite of these characteristics, the method has some drawback-we cannot use numbers of speech signal for training and the discriminant information among common vectors is not defined. This paper suggests advanced method which can reduce error rate by maximizing the discriminant information among common vectors. And novel method to normalize the size of common vector also added. The result shows improved performance of algorithm and better recognition accuracy of 2% than conventional method.

  • PDF

Influence of lossy ground on impulse propagation in time domain for impulse ground penetrating radar (초광대역 임펄스 지반탐사레이더에서 지면의 영향에 따른 임펄스 전파 특성 연구)

  • Kim, Kwan-Ho;Park, Young-Jin;Yoon, Young-Joong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.11
    • /
    • pp.42-47
    • /
    • 2007
  • In this paper, influence of lossy ground and gap variation between lossy ground and UWB antenna on impulse propagation in time domain for impulse ground penetrating radar (GPR) is numerically and experimentally investigated. For this study, a novel planar UWB fat dipole antenna is developed. First, influence of lossy ground and gap variation between lossy ground and UWB antenna is simulated. For verification, a test field of sand and wet clay soil is built and using the developed dipole antenna, transmission behavior is investigated at the test field. With an aid of IDFT (inverse discrete Fourier transform), time domain impulse response for transmission coefficient measured and simulated in frequency domain is obtained. Measurement and simulation show that the frequency of maximum transmission coefficient and transmission coefficient are increased with higher dielectric constant and larger gap distance. In time domain, it is shown that for higher dielectric constant, the amplitude of the received signal in time domain is higher and reflected signals are seriously modified. Also, it is found that variation of gap between antenna and ground surface makes timing of peak value changed.