• Title/Summary/Keyword: Gray code

Search Result 102, Processing Time 0.029 seconds

CRG Algorithm and nTCAM for the Efficient Packet Filtering System (효율적인 패킷 필터링 시스템을 위한 CRG 알고리즘과 nTCAM)

  • Kim Yong-Kwon;Lee Soon-Seok;Kim Young-Sun;Ki Jang-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.745-756
    • /
    • 2006
  • The general packet filtering system using TCAM has some limitations such as range and negation rules filtering, so this paper proposes efficient searching schemes than existing methods. CRG(Converting Range rules using Gray code) algorithm, in the case of range rules, that takes advantage of the gray code and TCAM characteristics to save a number of TCAM entries is proposed, and a nTCAM(TCAM with negation) architecture for negation rules is proposed, implemented using a FPGA design tool, and verified through the wave simulation. According to the simulation with the SNORT rules, the CRG algorithm and nTCAM save TCAM entries about 93% in IPv4 and 98% in IPv6 than the existing method.

Optimized Algebra LDPC Codes for Bandwidth Efficient Modulation

  • Hwang, Gi-Yean;Yu Yi;Lee, Moon-Ho
    • Journal of electromagnetic engineering and science
    • /
    • v.4 no.1
    • /
    • pp.17-22
    • /
    • 2004
  • In this paper, we implement an efficient MLC/PDL system for AWGN channels. In terms of the tradeoff between the hardware implementation and system performance, proposed algebra LDPC codes are optimized by the Gaussian approximation(GA) according to the rate of each level assigned by the capacity rule and chosen as the component code. System performance with Ungerboeck Partitioning(UP), Miked Partitioning(MP) and Gray Mapping(GM) of 8PSK are evaluated, respectively. Many results are presented in this paper; they can indicate that the proposed MLC/PDL system using optimized algebra LDPC codes with different code rate, capacity rule and Gray mapping(GM) can achieve the best performance.

A Study on the Structure of Turbo Trellis Coded Modulation with an Effectively Reduced Complexity in Wireless Communication Channel (무선통신채널에서 효과적으로 감소된 복잡도를 갖는 Turbo Trellis Coded Modulation 구조 연구)

  • Kim Jeong-su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.409-412
    • /
    • 2004
  • This paper shows that the proposed Turbo TCM(Turbo Trellis Coded Modulation) has a good performance with a little complexity of decoder. The encoder structure, which is connected with Turbo Codes, is the proposed modulation technique for an efficient bandwidth, This method is used symbol by symbol MAP decoder of iteration similar to binary Turbo Codes in the receiver. The result shows that the BER performance according to iteration is improved about 2,5dB at $BER=10^{-2}$ compared to Turbo Codes with Gray mapping.

  • PDF

CONSTRUCTION FOR SELF-ORTHOGONAL CODES OVER A CERTAIN NON-CHAIN FROBENIUS RING

  • Kim, Boran
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.193-204
    • /
    • 2022
  • We present construction methods for free self-orthogonal (self-dual or Type II) codes over ℤ4[v]/〈v2 + 2v〉 which is one of the finite commutative local non-chain Frobenius rings of order 16. By considering their Gray images on ℤ4, we give a construct method for a code over ℤ4. We have some new and optimal codes over ℤ4 with respect to the minimum Lee weight or minimum Euclidean weight.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

Group Manchester Code Scheme for Medical In-body WBAN Systems (의료용 in-body WBAN 시스템을 위한 Group Manchester code 변조 방식)

  • Choi, Il-Muk;Won, Kyung-Hoon;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10C
    • /
    • pp.597-604
    • /
    • 2011
  • In this paper, we propose group Manchester code (GM) modulation scheme for medical in-body wireless body area network (WBAN) systems. In IEEE, the WBAN system is assigned as 802.15. Task Group 6 (TG 6), and the related standardization is being progressed, Recently, in this Group, group pulse position modulation (GPPM), which can obtain data rate increase by grouping pulse position modulation (PPM) symbols, is proposed as a new modulation scheme for low-power operation of WBAN system. However, the conventional method suffers from BER performance degradation due to the absence of gray coding and its demodulation characteristics. Therefore, in this paper, we propose a modified GM scheme which groups Manchester code instead of PPM. In the proposed GM scheme, a low-complexity maximum likelihood (ML) demodulation method is employed in order to maximize the BER performances, Also, log likelihood ratio (LLR) decision method is proposed to employ the Turbo code as forward error correction (FEC), Finally, we verified that the proposed method has a good performance and is an appropriate scheme for in-body WBAN system through extensive performance evaluation.

A Study on the Block Truncation Coding Using the Bit-plane Reduction (비트평면 감축을 이용한 블록 절단부호화에 관한 연구)

  • 이형호;박래홍
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.5
    • /
    • pp.833-840
    • /
    • 1987
  • A new Block Truncation Coding(BTC) technique reducing the bit-plane and using differential pulse code modulation (DPCM) is proposed and compared with the conventional BTC methods. A new technique decides whether the subblock can be approximated to be uniform or not. If the subblock can be approximated to be uniform(merge mode), we transmit only the gray-level informantion. It not (split mode), we transmity both the bit-plane and the gray-level information. DPCM method is proposed to the encoding of gray-level information when the subblock can be approximated to be uniform. Also modified quantization method is presented to the encoding of gray-level information when the subblock is not uniform. This technique shows the results of coding 256 level images at the average data rate of about 0.75 bits/pel.

  • PDF

The Study of Performance Improvement of the 3-Cup Anemometer using Interpolation Methods (Interpolation을 이용한 3-CUP Anemometer의 성능 개선에 관한 연구)

  • 이성신;정택식;구법모
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.672-675
    • /
    • 2001
  • In this paper, we propose that the calculation method for accurate wind speed using interpolation methods, and the finding method for accurate wind direction using interpolation polynomial, so we make better performance for 3-Cup Anemometer by the proposed methods. We embody the 3-Cup Anemometer with photo sensor to measure wind direction and wind speed. In order to more accurate wind speed and wind direction, we present the methods to overcome the limitations of system memory and of the sensor measurement error by 8 bit gray code (as substitute 360 degrees for 256 degrees data).

  • PDF

Bitwise Decomposition Algorithm for Gray Coded M-PSK Signals (Gray 부호화된 M-PSK 신호의 비트 정보 분할 알고리듬)

  • Kim Ki-Seol;Hyun Kwang-Min;Park Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.784-789
    • /
    • 2006
  • In this paper, we propose a bitwise information decomposition algorithm for an M-PSK signal based on the Max-Log-MAP algorithm. In order to obtain the algorithm, we use a coordinate transformation from M-PSK to M-PAM signal space. Using the proposed algorithm, we analyze the performance of a Turbo iterative decoding method. The proposed algorithm can be applicable not only for a communication with PSK and iterative decoding method but for adaptive modulation and coding system.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.