• Title/Summary/Keyword: P Code

Search Result 707, Processing Time 0.027 seconds

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Spectral Efficiency 0f Symmetric Balance Incomplete Block Design Codes (Symmetric Balance Incomplete Block Design Code의 Spectral Efficiency)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.117-123
    • /
    • 2013
  • By calculating the spectral efficiency of symmetric balance incomplete block design(BIBD) codes satisfying BER=$10^{-9}$, it can be found that ideal BIBD code design with m=2 and various q's is effective when effective power is high($P_{sr}=-10$ dBm). But BIBD code design with q > 2 and various m's can be effective when effective power is low($P_{sr}=-25$ dBm).

Performance Comparison of Different GPS L-Band Dual-Frequency Signal Processing Technologies

  • Kim, Hyeong-Pil;Jeong, Jin-Ho;Won, Jong-Hoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2018
  • The Global Positioning System (GPS) provides more accurate positioning estimation performance by processing L1 and L2 signals simultaneously through dual frequency signal processing technology at the L-band rather than using only L1 signal. However, if anti-spoofing (AS) mode is run at the GPS, the precision (P) code in L2 signal is encrypted to Y code (or P(Y) code). Thus, dual frequency signal processing can be done only when the effect of P(Y) code is eliminated through the L2 signal processing technology. To do this, a codeless technique or semi-codeless technique that can acquire phase measurement information of L2 signal without information about W code should be employed. In this regard, this paper implements L2 signal processing technology where two typical codeless techniques and four typical semi-codeless techniques of previous studies are applied and compares their performances to discuss the optimal technique selection according to implementation environments and constraints.

A Syndrome-distribution decoding MOLS L$_{p}$ codes

  • Hahn, S.;Kim, D.G.;Kim, Y.S.
    • Communications of Mathematical Education
    • /
    • v.6
    • /
    • pp.371-381
    • /
    • 1997
  • Let p be an odd prime number. We introduce simple and useful decoding algorithm for orthogonal Latin square codes of order p. Let H be the parity check matrix of orthogonal Latin square code. For any x ${\in}$ GF(p)$^{n}$, we call xH$^{T}$ the syndrome of x. This method is based on the syndrome decoding for linear codes. In L$_{p}$, we need to find the first and the second coordinates of codeword in order to correct the errored received vector.

  • PDF

Effect of Line-Width of Optical Sources on Performance of Spectral Amplitude Coding Optical CDMA Systems (광원 라인폭이 Spectral Amplitude Coding Optical CDMA시스템의 성능에 미치는 영향)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.119-124
    • /
    • 2015
  • In this paper, we analyze the effect of line-width of optical sources on the performance of spectral amplitude coding (SAC) optical code division multiple-access (OCDMA) systems. For a performance analysis we use a symmetric balanced incomplete block design (BIBD) code as the code sequence because we can construct a series of code families by choosing different values of q and m. The ideal BIBD code (m=2) requires narrower line-width than the nonideal BIBD codes when the effective power is large ($P_{sr}=-10dBm$). But the nonideal BIBD codes (m>2) need narrower line-width than the ideal BIBD code when $P_{sr}=-25dBm$.

A Study on the PN code Acquisition for DS/CDMA System over Phas-Error (위상에러를 고려한 DS/CDMA시스템의 PN 부호 획득에 관한 연구)

  • 정남모
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.128-134
    • /
    • 2002
  • In this paper, the performance on the PN code acquisition of DS/CDMA system was analyzed using the Nakagami-m probability density function considered fading environment. The equations on detection probability, $P_D$ and false alarm probability, $P_{FA}$, decision variables affecting the PN code acquisition time were derived and proved using simulation in order to analyze the performance. In conclusion, It was necessary increasing the gain of PLL for correcting phase errors and improving the acquisition performance of PN code in apply to the rake receiver.

  • PDF

Nonlinear seismic performance of code designed perforated steel plate shear walls

  • Barua, Kallol;Bhowmick, Anjan K.
    • Steel and Composite Structures
    • /
    • v.31 no.1
    • /
    • pp.85-98
    • /
    • 2019
  • Nonlinear seismic performances of code designed Perforated Steel Plate Shear Walls (P-SPSW) were studied. Three multi-storey (4-, 8-, and 12-storey) P-SPSWs were designed according to Canadian seismic provisions and their performance was evaluated using time history analysis for ground motions compatible with Vancouver response spectrum. The selected code designed P-SPSWs exhibited excellent seismic performance with high ductility and strength. The current code equation was found to provide a good estimation of the shear strength of the perforated infill plate, especially when the infill plate is yielded. The applicability of the strip model, originally proposed for solid infill plate, was also evaluated for P-SPSW and two different strip models were studied. It was observed that the strip model with strip widths equal to center to center diagonal distance between each perforation line could reasonably predict the inelastic behavior of unstiffened P-SPSWs. The strip model slightly underestimated the initial stiffness; however, the ultimate strength was predicted well. Furthermore, applicability of simple shear-flexure beam model for determination of fundamental periods of P-SPSWs was studied.

Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode

  • Cai, Yong;Li, Peng;Li, Xi-Wen;Zhao, Jing;Chen, Hai;Yang, Qing;Hu, Hao
    • Journal of Ginseng Research
    • /
    • v.41 no.3
    • /
    • pp.339-346
    • /
    • 2017
  • Background: In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. Methods: HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Results: Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. Conclusion: P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical basis for the development of a quality traceability system of traditional Chinese medicine based on a two-dimensional code.

Analysis of Code Sequence Generating Algorithm and Its Implementation based on Normal Bases for Encryption (암호화를 위한 정규기저 기반 부호계열 발생 알고리즘 분석 및 발생기 구성)

  • Lee, Jeong-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.48-54
    • /
    • 2014
  • For the element ${\alpha}{\in}GF(p^n)$, two kinds of bases are known. One is a conventional polynomial basis of the form $\{1,{\alpha},{\alpha}^2,{\cdots},{\alpha}^{n-1}\}$, and the other is a normal basis of the form $\{{\alpha},{\alpha}^p,{\alpha}^{p^2},{\cdots},{\alpha}^{p^{n-1}}\}$. In this paper we consider the method of generating normal bases which construct the finite field $GF(p^n)$, as an n-dimensional extension of the finite field GF(p). And we analyze the code sequence generating algorithm and derive the implementation functions of code sequence generator based on the normal bases. We find the normal polynomials of degrees, n=5 and n=7, which can generate normal bases respectively, design, and construct the code sequence generators based on these normal bases. Finally, we produce two code sequence groups(n=5, n=7) by using Simulink, and analyze the characteristics of the autocorrelation function, $R_{i,i}(\tau)$, and crosscorrelation function, $R_{i,j}(\tau)$, $i{\neq}j$ between two different code sequences. Based on these results, we confirm that the analysis of generating algorithms and the design and implementation of the code sequence generators based on normal bases are correct.