• Title/Summary/Keyword: access code

Search Result 1,013, Processing Time 0.025 seconds

Numerical Algorithm for Phase Offsets of Binary Codes in the Code Division Multiple Access System

  • Park, Hong-Goo
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.227-230
    • /
    • 2006
  • There has been a growing need for increased capacity in cellular systems. This has resulted in the adoption of the code division multiple access (CDMA) system as a multiple channel access method. Thus, it is important to obtain the phase offsets of binary codes in the CDMA system because distinct phase offsets of the same code are used to distinguish signals received at the mobile station from different base stations. This letter proposes an efficient algorithm to compute the phase offset of a binary code in the CDMA system through the use of the basic facts of number theory and a new notion of the subcodes of a given code. We also formulate the algorithm in a compact form.

  • PDF

Low-Power IoT Microcontroller Code Memory Interface using Binary Code Inversion Technique Based on Hot-Spot Access Region Detection (핫스팟 접근영역 인식에 기반한 바이너리 코드 역전 기법을 사용한 저전력 IoT MCU 코드 메모리 인터페이스 구조 연구)

  • Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.97-105
    • /
    • 2016
  • Microcontrollers (MCUs) for endpoint smart sensor devices of internet-of-thing (IoT) are being implemented as system-on-chip (SoC) with on-chip instruction flash memory, in which user firmware is embedded. MCUs directly fetch binary code-based instructions through bit-line sense amplifier (S/A) integrated with on-chip flash memory. The S/A compares bit cell current with reference current to identify which data are programmed. The S/A in reading '0' (erased) cell data consumes a large sink current, which is greater than off-current for '1' (programmed) cell data. The main motivation of our approach is to reduce the number of accesses of erased cells by binary code level transformation. This paper proposes a built-in write/read path architecture using binary code inversion method based on hot-spot region detection of instruction code access to reduce sensing current in S/A. From the profiling result of instruction access patterns, hot-spot region of an original compiled binary code is conditionally inverted with the proposed bit-inversion techniques. The de-inversion hardware only consumes small logic current instead of analog sink current in S/A and it is integrated with the conventional S/A to restore original binary instructions. The proposed techniques are applied to the fully-custom designed MCU with ARM Cortex-M0$^{TM}$ using 0.18um Magnachip Flash-embedded CMOS process and the benefits in terms of power consumption reduction are evaluated for Dhrystone$^{TM}$ benchmark. The profiling environment of instruction code executions is implemented by extending commercial ARM KEIL$^{TM}$ MDK (MCU Development Kit) with our custom-designed access analyzer.

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Research on the PAPR Reduction Method using Selection of Extra Code Set in PB/MC-CDMA System (PB/MC-CDMA 시스템에서 여분의 코드집합을 이용한 PAPR 감쇄기법에 관한 연구)

  • Lee, Kyu-Jin;Lee, Dong-Joon;Lee, Kye-San;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.1
    • /
    • pp.110-118
    • /
    • 2009
  • The PB/MC-CDMA(Partial Block Multi Carrier Code Division Multilple Access) system can improve the performance by reducing the ICI(Inter-Code Interference) between users. Also, this system can achieve the frequency diversity gain by avoiding ISI(Inter Symbol Interference). Therefore, the performance of PB/MC-CDMA system is better than that of conventional MC-CDMA(Multi Carrier Code Division Multiple Access) system. However, similarly to other multi-carrier systems, it still has a PAPR(Peak to Average Power Ratio) issue. In this paper, we propose a peak power reduction technique involving optimized spreading code selection without side information for the PB/MC-CDMA. The PB/MC-CDMA system in each block of units reuses the code so the extra code will be remained. This extra code is divided into several groups to calculate the PAPR and solving the PAPR problem by transferring the selected code which has minimum peak power.

  • PDF

Design of a Correlator and an Access-code Generator for Bluetooth Baseband (블루투스 기저대역을 위한 상관기와 액세스 코드 생성 모듈의 설계)

  • Hwang Sun-Won;Lee Sang-Hoon;Shin Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.206-211
    • /
    • 2005
  • We describe the design for a correlator and an access code generator in bluetooth system. These are used for a connection setting, a packet decision and a clock synchronization between Bluetooth units. The correlator consists of two blocks; carry save adder based on Wallace tree and threshold-value decision block. It determines on an useful packet and clock-synchronization for input signal of 1.0Mbps through the sliding-window correlating. The access-code generator also consists of two blocks; BCH(Bose-Chadhuri-Hocquenghem) cyclic encoder and control block. It generates the access-codes according to four steps' generation process based on Bluetooth standard. In order to solve synchronization problem, we make use of any memory as a pseudo random sequence. The proposed correlator and access-code generator were coded with VHDL. An FPGA Implementation of these modules and the simulation results are proved by Xilinx chip. The critical delay and correlative margin based on synthesis show the 4.689ns and the allowable correlation-error up to 7-bit.

  • PDF

The Non-economic Value of CDMA (CDMA 의 비경제적 가치평가)

  • 한남대
    • Journal of Korea Technology Innovation Society
    • /
    • v.3 no.1
    • /
    • pp.127-138
    • /
    • 2000
  • This pape applies the multi-attribute utility theory for estimating the non-economci value of technology. The technology of the code division multiple access in mobile communications is used as a case study. The technology of the code division multiple access in mobile communications is used as a case study. The result shows that the multi-attribute utility theory is a useful method for es-tinmating the non-economic value of technology and gaining an insight into the importance of tech-nology innovation.

  • PDF

Synchronous Optical Fiber Code-Division Multiple-Access Networks Using Concatenated Codes for Channel Interference Cancellation

  • Lam, Pham Manh;Sripimanwat, Keattisak
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.536-539
    • /
    • 2002
  • The use of concatenated codes in noncoherent synchronous optical fiber CDMA networks is proposed. The concatenated code sequences are generated using balanced Walsh code sequences and Walsh code sequences. The selection of balanced Walsh code sequences is presented and the design of fully programmable transmitter and receiver is reported. The analysis of the system BER performance shows that multiple-access interference is completely eliminated and the BER performance of the proposed system is better than that of the non-coherent synchronous optical fiber CDMA system using optical orthogonal codes with double hard-limiters.

  • PDF

Two-Dimensional Symmetric Balance Incomplete Block Design Codes for Small Input Power (작은 입력신호를 위한 Two-Dimensional Symmetric Balance Incomplete Block Design Code)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.121-127
    • /
    • 2013
  • When input power is small, nonideal symmetric balance incomplete block design(BIBD) code design is effective in the spectral-amplitude-code(SAC) optical code-division multiple-access (OCDMA) system. But the number of simultaneous users is not sufficient. To overcome this property, we propose 2-D BIBD codes, where nonideal BIBD codes are used as spectral code and ideal BIBD codes are used as spatial codes. Analytical results show that the number of simultaneous users increases significantly.

Packet Error Probability of CDMA Packet Radio System with Puctured Convolutional Codes (Punctured 콘볼루션 코드 방식을 이용한 코드분할 다중통신에서 패킷 에러 확률)

  • 박형래;정호영;강창언
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.3 no.2
    • /
    • pp.22-29
    • /
    • 1992
  • In recent years there has been increased interest in a class of multiple-access techniques known as code division multiple-access(CDMA). As the trend for ever increasing data transmission rate and high error performance continues while conserving bandwidth, the needs arise for good highrate R=b/v convolu- tional codes such as punctured codes. In this paper, the packet error propability has been analyzed in code division multiple-access packet radio system which utilize punctured convolutional code and hard-decision Viterbi decoding.

  • PDF

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF