• 제목/요약/키워드: Information Symmetry

검색결과 290건 처리시간 0.026초

범역항법위성시스템 민간용신호의 부호동기추적편이 분석 (An Analysis of Code Tracking Bias for Civilian Signals in GNSS)

  • 유승수;김영문;김준태;김선용
    • 한국통신학회논문지
    • /
    • 제35권1C호
    • /
    • pp.123-129
    • /
    • 2010
  • 본 논문에서는 안정된 다중경로환경에서 동기 (coherent) 단일 및 이중 이른-늦은 상관차 판별기로 범역위성항법시스템 민간용 신호의 부호동기를 결정했을 때 잔존하는 오차인 부호동기추적편이를 분석한다. 이를 위해 중심 주파수 1575.42MHz의 대표적인 위성항법신호대역에서 이진위상천이 및 이진천이반송파 변조된 민간용신호 및 그 처리과정을 모형화하고, 이 모형을 바탕으로 다양한 경우에 대해 각 부호동기추적편이를 비교 분석한다.

일반 자기회귀 이분산 모형을 이용한 시계열 자료 분석 (Analyzing financial time series data using the GARCH model)

  • 김삼용;김진아
    • Journal of the Korean Data and Information Science Society
    • /
    • 제20권3호
    • /
    • pp.475-483
    • /
    • 2009
  • 본 연구에서는 한국종합주가지수 데이터를 이용하여 다양한 비선형 시계열 모형들을 소개하였다. 조건부 평균의 선형 모형으로는 상수항 모형, 자기회귀 모형을 살펴보았으며, 비선형 모형으로는 분계점 자기회귀 모형, 지수적 자기회귀 모형을 살펴보았다. 조건부 분산 모형으로는 일반 자기회귀 이분산 모형과 지수적 일반 자기회귀 이분산 모형, Glosten 등 (1993)의 모형 그리고 일반화 이항멱변환 분계점 일반 자기회귀 이분산 모형을 살펴보았다. 한편, 일반화 이항멱변환 분계점 일반 자기회귀 이분산 모형은 대표적 비대칭성 이분산성 모형인 Zakoian (1993) 모형과 Li와 Li (1996) 모형을 효과적으로 통합할 수 있는 변형된 모형이다. 본 연구에서는, 한국종합주가지수 데이터를 분석하여 새로운 모형의 효율성을 증명하였다.

  • PDF

고출력 증폭기의 비선형성 보상을 위한 메모리를 갖는 적응 데이터 사전왜곡기 (An Adaptive Data Predistorter with Memory for Compensation of Nonlinearities in High Power Amplifiers)

  • 이제석;조용수;임용훈;윤대희
    • 한국통신학회논문지
    • /
    • 제19권4호
    • /
    • pp.669-678
    • /
    • 1994
  • 본 논문에서는 QAM 신호를 전송하는 디지털 통신 시스템에서 고출력 증폭기(HPA)의 비선형성을 보상하기 위한 메모리 있는 데이터 사전왜곡 방법을 제안한다. 메모리 없는 HPA의 비선형성을 줄이기 위해 구현된 종래의 데이터 사전왜곡 방법에 비해, 본 논문에서 제안된 방법은 신호 성상도의 비선형 왜곡(warping)을 줄여 줄 뿐만 아니라 메모리 있는 전송 펄스 형성 필터로 인해 일어나는 심볼의 군집(cluster)을 원래의 심볼로 보상한다. 본 논문에서는 사전왜곡단의 메모리 크기를 줄이기 위해 QAM 신호 성상도의 대칭성을 고려하여 modulo-4 연산을 이용한다.

  • PDF

Identification of Transformed Image Using the Composition of Features

  • Yang, Won-Keun;Cho, A-Young;Cho, Ik-Hwan;Oh, Weon-Geun;Jeong, Dong-Seok
    • 한국멀티미디어학회논문지
    • /
    • 제11권6호
    • /
    • pp.764-776
    • /
    • 2008
  • Image identification is the process of checking whether the query image is the transformed version of the specific original image or not. In this paper, image identification method based on feature composition is proposed. Used features include color distance, texture information and average pixel intensity. We extract color characteristics using color distance and texture information by Modified Generalized Symmetry Transform as well as average intensity of each pixel as features. Individual feature is quantized adaptively to be used as bins of histogram. The histogram is normalized according to data type and it is used as the signature in comparing the query image with database images. In matching part, Manhattan distance is used for measuring distance between two signatures. To evaluate the performance of the proposed method, independent test and accuracy test are achieved. In independent test, 60,433 images are used to evaluate the ability of discrimination between different images. And 4,002 original images and its 29 transformed versions are used in accuracy test, which evaluate the ability that the proposed algorithm can find the original image correctly when some transforms was applied in original image. Experiment results show that the proposed identification method has good performance in accuracy test. And the proposed method is very useful in real environment because of its high accuracy and fast matching capacity.

  • PDF

보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현 (Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility)

  • 이구연;이용;김화종;정충교;이동은
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

A Study on Cooperation between Kerberos system and Credit-Control Server

  • Choi, Bae-Young;Lim, Hyung-Jin;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.281-284
    • /
    • 2005
  • Kerberos is system that offer authorization in internet and authentication service. Can speak that put each server between client and user in distributed environment and is security system of symmetry height encryption base that offer authentication base mutually. Kerberos authentication is based entirely on the knowledge of passwords that are stored on the Kerberos Server. A user proves her identity to the Kerberos Server by demonstrating Knowledge of the key. The fact that the Kerberos Server has access to the user's decrypted password is a rwsult of the fact that Kerberos does not use public key cryptogrphy. It is a serious disadvantage of the Kerbercs System. The Server must be physically secure to prevent an attacker from stealing the Kerberos Server and learning all of the user passwords. Kerberos was designend so that the server can be stateless. The Kerberos Server simply answers requests from users and issues tickets. This study focused on designing a SIP procy for interworking with AAA server with respect to user authentication and Kerberos System. Kerberos is security system of encryption base that offer certification function mutually between client application element and server application element in distributed network environment. Kerberos provides service necessary to control whether is going to approve also so that certain client may access to certain server. This paper does Credit-Control Server's function in AAA system of Diameter base so that can include Accounting information that is connected to Rating inside certification information message in Rating process with Kerberos system.

  • PDF

초고속 후두내시경 영상을 이용한 평면 스캔 비디오카이모그래피 영상 생성 (Post-Processing of High-Speed Video-Laryngoscopic Images to Two-Dimensional Scanning Digital Kymographic Images)

  • 차원재;왕수건;장전엽;김근효;이연우
    • 대한후두음성언어의학회지
    • /
    • 제28권2호
    • /
    • pp.89-95
    • /
    • 2017
  • Background and Objectives : High-speed videolaryngoscopy (HSV) is the only technique that captures the true intra-cycle vibratory behavior of the vocal folds by capturing full images of the vocal folds. However, it has problems of no immediate feedback during examination, considerable waiting time for digital kymography (DKG), recording duration limited to a few seconds, and extreme demands for storage space. Herein, we demonstrate a new post-processing method that converts HSV images to two-dimensional digital kymography (2D-DKG) images, which adopts the algorithm of 2D videokymography (2D VKG). Materials and Methods : HSV system was used to capture images of vocal folds. HSV images were post-processed in Kay image-process software (KIPS), and conventional DKG images were retrieved. Custom-made post-processing system was used to convert HSV images to 2D-DKG images. The quantitative parameters of the post-processed 2D-DKG images was validated by comparing these parameters with those of the DKG images. Results : Serial HSV images for all phases of vocal fold vibratory movement are included. The images were converted by the scanning method using U-medical image-process software. Similar to conventional DKG, post-processed 2D DKG image from the HSV image can provide quantitative information on vocal fold mucosa vibration, including the various vibratory phases. Differences in amplitude symmetry index, phase symmetry index, open quotient, and close quotient between 2D-DKG and DKG were analyzed. There were no statistical differences between the quantitative parameters of vocal fold vibratory movement in 2D-DKG and DKG. Conclusion : The post-processing method of converting HSV images to 2D DKG images could provide clinical information and storage economy.

  • PDF

전력전자 기술을 응용한 의료장비 개발 사례 (Example Development of Medical equipment applying Power Electronics Technique)

  • 고종선;이태훈;김영일;김규겸;박병림;김민선
    • 전력전자학회:학술대회논문집
    • /
    • 전력전자학회 2002년도 전력전자학술대회 논문집
    • /
    • pp.661-664
    • /
    • 2002
  • A control of the body posture and movement is maintained by the vestibular system, vision, and proprioceptors. Afferent signals from those receptors are transmitted to the vestibular nuclear complex, and the efferent signals from the vestibular nuclear complex control the eye movement. The postural disturbance caused by loss of the vestibular function results in nausea, vomiting, vertigo and loss of craving for life. The purpose of this study is to develop a off-vertical rotatory system for evaluating the function of semicircular canals and otolith organs, selectively, and visual stimulation system for stimulation with horizontal, vertical and 3D patterns. The Off-vertical axis rotator which stimulates semicircular canals and otolith organs selectively is composed of a comportable chair, a DC servo-motor with reducer and a tilting table controlled by PMSM. And a double feedback loop system containing a velocity feedback loop and a position feedback loop is applied to the servo controlled rotatory chair system. Horizontal, vertical, and 3D patterns of the visual stimulation for applying head mounted display are developed. And wireless portable systems for optokinetic stimulation and recording system of the eye movement is also constructed. The Gain, phase, and symmetry is obtained from analysis of the eye movement induced by vestibular and visual stimulation. Detailed data were described.

  • PDF

실영상에서 형태 정보와 에지 영상을 이용한 교통 표지판 영역 추출과 인식 (Segmentation and Recognition of Traffic Signs using Shape Information and Edge Image in Real Image)

  • 곽현욱;오준택;김욱현
    • 정보처리학회논문지B
    • /
    • 제11B권2호
    • /
    • pp.149-158
    • /
    • 2004
  • 본 논문은 실영상에서 형태 정보와 에지 영상을 이용한 교통 표지판 영역 추출 및 인식 방법을 제안한다. 화소의 RGB 색상비를 이용하여 생성한 이진 영상에서 connected component 알고리듬에 의해 분할된 후보 영역들을 대상으로 형태 정보인 XY축 대칭성을 기반으로 교통 표지판 영역을 추출한다. 만약 후보 영역이 검출되지 않을 경우, 히스토그램 평활화에 의해 대비를 향상함으로써 영역 추출이 가능하다. 그리고 교통 표지판 영역의 에지 영상에서 추출한 수평-수직 투영(XY projection). 모멘트(moment), 동심원형 패턴 및 8 방향 광선과 에지와의 거리 및 교차점의 개수 등의 형태 정보를 기반으로, 사전에 구축한 데이터베이스와의 유사도 측정에 의해 인식을 수행한다. 다양한 실영상을 대상으로 실험한 결과, 본 방법이 빛이나 날씨 조건 등의 외부 환경에 강건하게 추출 및 인식함을 보인다.

Opportunistic Relay Selection for Joint Decode-and-Forward Based Two-Way Relaying with Network Coding

  • Ji, Xiaodong;Zheng, Baoyu;Zou, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권9호
    • /
    • pp.1513-1527
    • /
    • 2011
  • This paper investigates the capacity rate problems for a joint decode-and-forward (JDF) based two-way relaying with network coding. We first characterize the achievable rate region for a conventional three-node network scenario along with the calculation of the corresponding maximal sum-rate. Then, for the goal of maximizing the system sum-rate, opportunistic relay selection is examined for multi-relay networks. As a result, a novel strategy for the implementation of relay selection is proposed, which depends on the instantaneous channel state and allows a single best relay to help the two-way information exchange. The JDF scheme and the scheme using relay selection are analyzed in terms of outage probability, after which the corresponding exact expressions are developed over Rayleigh fading channels. For the purpose of comparison, outage probabilities of the amplify-and-forward (AF) scheme and those of the scheme using relay selection are also derived. Finally, simulation experiments are done and performance comparisons are conducted. The results verify that the proposed strategy is an appropriate method for the implementation of relay selection and can achieve significant performance gains in terms of outage probability regardless of the symmetry or asymmetry of the channels. Compared with the AF scheme and the scheme using relay selection, the conventional JDF scheme and that using relay selection perform well at low signal-to-noise ratios (SNRs).