• Title/Summary/Keyword: Information propagation

Search Result 2,178, Processing Time 0.027 seconds

Generalized Self Spread-Spectrum Communications with Turbo Soft Despreading and Decoding

  • Tomasin Stefano;Veronesi Daniele
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.267-274
    • /
    • 2006
  • Self-spreading (SSP) is a spread spectrum technique where the spreading sequence is generated from data bits. Although SSP allows communications with low probability of interception by unintended receivers, despreading by the intended receiver is prone to error propagation. In this paper, we propose both a new transmitter and a new receiver based on SSP with the aim to a) reduce error propagation and b) increase the concealment of the transmission. We first describe a new technique for the generation of SSP spreading sequence, which generalizes SSPs of existing literature. We include also coding at the transmitter, in order to further reduce the effects of error propagation at the receiver. For the receiver, we propose a turbo architecture based on the exchange of information between a soft despreader and a soft-input soft-output decoder. We design the despreader in order to fully exploit the information provided by the decoder. Lastly, we propose a chip decoder that extracts the information on data bits contained in the spreading sequence from the received signal. The performance of the proposed scheme is evaluated and compared with existing spread-spectrum systems.

A Dynamic Approach to Estimate Change Impact using Type of Change Propagation

  • Gupta, Chetna;Singh, Yogesh;Chauhan, Durg Singh
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.597-608
    • /
    • 2010
  • Software evolution is an ongoing process carried out with the aim of extending base applications either for adding new functionalities or for adapting software to changing environments. This brings about the need for estimating and determining the overall impact of changes to a software system. In the last few decades many such change/impact analysis techniques have been developed to identify consequences of making changes to software systems. In this paper we propose a new approach of estimating change/impact analysis by classifying change based on type of change classification e.g. (a) nature and (b) extent of change propagation. The impact set produced consists of two dimensions of information: (a) statements affected by change propagation and (b) percentage i.e. statements affected in each category and involving the overall system. We also propose an algorithm for classifying the type of change. To establish confidence in effectiveness and efficiency we illustrate this technique with the help of an example. Results of our analysis are promising towards achieving the aim of the proposed endeavor to enhance change classification. The proposed dynamic technique for estimating impact sets and their percentage of impact will help software maintainers in performing selective regression testing by analyzing impact sets regarding the nature of change and change dependency.

Belief propagation stereo matching technique using 2D laser range finder (2차원 레이저 거리측정기를 활용한 신뢰도 전파 스테레오 정합 기법)

  • Kim, Jin-Hyung;Ko, Yun-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.132-142
    • /
    • 2014
  • Stereo camera is drawing attention as an essential sensor for future intelligence robot system since it has the advantage of acquiring not only distance but also other additive information for an object. However, it cannot match correlated point on target image for low textured region or periodic patterned region such as wall of building or room. In this paper, we propose a stereo matching technique that increase the matching performance by fusing belief propagation stereo matching algorithm and local distance measurements of 2D-laser range finder in order to overcome this kind of limitation. The proposed technique adds laser measurements by referring quad-tree based segment information on to the local-evidence of belief propagation stereo matching algorithm, and calculates compatibility function by reflecting over-segmented information. Experimental results of the proposed method using simulation and real test images show that the distance information for some low textured region can be acquired and the discontinuity of depth information is preserved by using segmentation information.

Propagation Neural Networks based on vision techniques for detecting of Faulty Insulator (불량애자 검출을 위한 비젼 기반 전파 신경망)

  • Kim, Jong-Man;Kim, Young-Min;Hwang, Jong-Sun;Park, Hyun-Chul;Lim, Sung-Ho;Kim, Hyun-Chul
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.07b
    • /
    • pp.1097-1102
    • /
    • 2002
  • For detecting of Faulty Insulator, a new Lateral Information Propagation Networks (LIPN) has been proposed. Energized insulator is reduced the rate of insulation extremely, and taken the results dirty and injured. It is necessary to be actions that detect the faulty insulator and exchange the new one. And thus, we have designed the LIPN to be detected that insulators by the real time computation method through the inter-node diffusion. In the network, a node corresponds to a state in the quantized input space. Each node is composed of a processing unit and fixed weights from its neighbor nodes as well as its input terminal. Information propagates among neighbor nodes laterally and inter-node interpolation is achieved. Through several simulation experiments,real time reconstruction of the nonlinear image information is processed.

  • PDF

Improvement of 3-Dimensional Finite-Difference Beam Propagation Method by Combining the Implicit and the Explicit methods (Implicit와 explicit 방법의 결합에 의한 3차원 유한차분 빔전파 방법의 개선)

  • Kim, Hyun-Jun;O, Beom-Hoan;Park, Se-Geun;Lee, El-Hang;Lee, Seung-Gol
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.6
    • /
    • pp.555-562
    • /
    • 2004
  • We propose a hybrid method combining the implicit with the explicit methods in order to reduce the calculation time and improve the convergence problem of the 3-dimensional finite-difference beam propagation method. The numerical simulation of a directional coupler is carried out by the proposed method. It is found from the simulation results that the calculation speed of our method is 10 times faster than that of direct solving techniques.

Adaptive Cache Maintenance Scheme based on Connection States in Mobile Computing Environments (이동 컴퓨팅 환경하의 연결 상태를 기반으로 한 적응적 캐쉬 유지 기법)

  • Nam, Sung-Hun;Cho, Sung-Ho;Hwang, Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.149-159
    • /
    • 2000
  • In mobile computing environments, invalidation and propagation method based on broadcasting is used to transmit the information for cache maintenance of mobile hosts. Previous researches generally adopted invalidation method that easily adapts to the limited network bandwidth and the frequent disconnection. But the invalidation of frequently accessed data causes the contention on the wireless network with the increasing cache requests. Although the propagation method can reduce the cache requests, the high probability of broken message or loss of message is the main factor that degrades the system performance. To resolve these problems, we propose adaptive cache maintenance scheme that dynamically adjusts the broadcasting ratio of invalidation and propagation, according to the wireless network connection states. The proposed scheme broadcasts the propagation message in stable connection state, so it can reduce the cache requests and server response time. With the decreasing available network bandwidth by the frequent partial disconnection and disconnection, the proposed scheme dynamically increases the broadcasting ratio of the invalidation messages to minimize the broken message or the loss of message probability. Consequently, the proposed scheme resolves the problems which arise in the invalidation or propagation method in mobile computing environments.

  • PDF

Propagation Characteristics Analysis for an Urban Site of Geostationary Earth Orbit Satellite using Ka-band (Ka-band를 활용한 정지궤도 위성의 도심지 전파특성 분석)

  • Kim, Joo-Seok;Park, No-Wook;Lim, Joo-Yoeng;Lim, Tae-Hyuk;Yoo, Chang-Hyun;Kwon, Kun-Sup;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.181-187
    • /
    • 2012
  • In satellite communication system, propagation characteristics analysis of the receiving environment is very important, because radio quality is changed by the receiving environment. Unlike Terrestrial wireless communications, satellite communication is affected by altitude and atmospheric environment. Therefore, there are many factors to consider for propagation characteristics analysis. In this paper, signal reception environment of geostationary earth orbit was analyzed on urban environment. In order to analyze the propagation simulation, virtual buildings was established and reception environment was changed. The results of this paper would help to design the satellite mobile communication systems in Ka-band.

Propagation Models for Structural Parameters in Online Social Networks (온라인 소셜 네트워크에서 구조적 파라미터를 위한 확산 모델)

  • Kong, Jong-Hwan;Kim, Ik Kyun;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.125-134
    • /
    • 2014
  • As the social media which was simple communication media is activated on account of twitter and facebook, it's usability and importance are growing recently. Although many companies are making full use of its the capacity of information diffusion for marketing, the adverse effects of this capacity are growing. Because social network is formed and communicates based on friendships and relationships, the spreading speed of the spam and mal-ware is very swift. In this paper, we draw parameters affecting malicious data diffusion in social network environment, and compare and analyze the diffusion capacity of each parameters by propagation experiment with XSS Worm and Koobface Worm. In addition, we discuss the structural characteristics of social network environment and then proposed malicious data propagation model based on parameters affecting information diffusion. n this paper, we made up BA and HK models based on SI model, dynamic model, to conduct the experiments, and as a result of the experiments it was proved that parameters which effect on propagation of XSS Worm and Koobface Worm are clustering coefficient and closeness centrality.

Performance analysis of BTB-TDMA considering asymmetry of propagation delays in UANets (수중 네트워크의 전파 비대칭성을 고려한 BTB-TDMA 성능 분석)

  • Cho, A-Ra;Yun, Changho;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • A Block-Time-Bounded Time Division Multiple Access (BTB-TDMA) medium access control protocol, which estimates the propagation delay of nodes according to their location and moving velocity information, has been proposed for underwater acoustic networks. BTB-TDMA provides nodes with their transmission schedules by a time block that is a time unit, newly designed for BTB-TDMA. In this paper, we investigate how the receiver collision, that is induced by the asymmetry between node's uplink and downlink propagation delay due to its mobility, affects the performance of BTB-TDMA. To do this, we analytically obtain the collision rate, the channel access delay, and the channel utilization by considering the asymmetry of propagation delay. Then, simulations are extensively performed with respect to the length of a time block by varying the number of nodes, the network range, and the node's velocity. Thus, the simulation results can suggest performance criteria to determine the optimal length of a time block which minimizes the collision rate and concurrently maximizes the channel access delay and the channel utilization.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.