• Title/Summary/Keyword: digital communication systems

Search Result 1,155, Processing Time 0.032 seconds

Analysis of Nonlinearity of RF Amplifier and Back-Off Operations on the Multichannel Wireless Transmission Systems. (다 채널 무선 전송 시스템의 RF증폭기의 비선형 및 백-오프 동작 분석)

  • 신동환;정인기;이영철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.18-27
    • /
    • 2004
  • In this paper, we presents an analytical simulation procedure for evaluation in baseband digital modulated signals distortions in the present of RF power amplifier(SSPA) nonlinear behavior and backoff operations of OFDM wireless transmission system. we obtained the optimum nonlinear transfer function of designed SSPA with the SiGe HBT bias currents of OFDM multi-channel wireless transmission system and compared this transfer function to SSPA nonlinear modeling functions mathematically, we finds optimum bias conditions of designed SSPA. With the derived nonlinear modeling function of SSPA, We analysed the PSD characteristics of in-band and out-band output powers of SSPA EVM measurement results of distorted constellation signals with the input power levels of SSPA. The results of paper can be applied to find the SSPA linearly with optimum bias currents and determine the SSPA input backoff bias for AGC control circuits of SSPA.

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.

The Effects of the 4th Industrial Revolution on the Capability of Smart Manufacturing (4차 산업혁명이 스마트 제조 역량에 미치는 영향)

  • Oh, Wonguen;Kim, Injai
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.111-118
    • /
    • 2018
  • The effects of the Fourth Industrial Revolution on manufacturing are spreading by policies to secure or strengthen the manufacturing competitiveness of each country. Strengthening policies on manufacturing necessitate nurturing manpower for smart manufacturing. This study examines the difference of the experts' perception about the educational curriculum to develop the knowledge of Product Lifecycle which covers the whole knowledge area of product development among the knowledge areas aimed at fostering the manpower of smart manufacturing for the $4^{th}$ Industrial Revolution Era. Experts were aware that future developments in digital development, production, and new product development are most important, and that they feel that the whole knowledge area is generally weak. In this study, the implications for the development of educational curriculum in the future are derived from the perception difference of knowledge on Product Lifecycle obtained through expert survey.

Development of a Real-Time Measurement System for Horizontal Soil Strength

  • Cho, Yongjin;Lee, Dong Hoon;Park, Wonyeop;Lee, Kyou Seung
    • Journal of Biosystems Engineering
    • /
    • v.40 no.3
    • /
    • pp.165-177
    • /
    • 2015
  • Purpose: Accurate monitoring of soil strength is a key technology applicable to various precision agricultural practices. Soil strength has been traditionally measured using a cone penetrometer, which is time-consuming and expensive, making it difficult to obtain the spatial data required for precision agriculture. To improve the current, inefficient method of measuring soil strength, our objective was to develop and evaluate an in-situ system that could measure horizontal soil strength in real-time, while moving across a soil bin. Methods: Multiple cone-shape penetrometers were horizontally assembled at the front of a vertical plow blade at intervals of 5 cm. Each penetrometer was directly connected to a load cell, which measured loads of 0-2.54 kN. In order to process the digital signals from every individual transducer concurrently, a microcontroller was embedded into the measurement system. Wireless data communication was used between a data storage device and this real-time horizontal soil strength (RHSS) measurement system travelling at 0.5 m/s through an indoor experimental soil bin. The horizontal soil strength index (HSSI) measured by the developed system was compared with the cone index (CI) measured by a traditional cone penetrometer. Results: The coefficient of determination between the CI and the HSSI at depths of 5 cm and 10 cm ($r^2=0.67$ and 0.88, respectively) were relatively less than those measured below 20 cm ($r^2{\geq}0.93$). Additionally, the measured HSSIs were typically greater than the CIs for a given numbers of compactor operations. For an all-depth regression, the coefficient of determination was 0.94, with a RMSE of 0.23. Conclusions: A HSSI measurement system was evaluated in comparison with the conventional soil strength measurement system, CI. Further study is needed, in the form of field tests, on this real-time measurement and control system, which would be applied to precision agriculture.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping

  • Shin, Dong-Kyoo;Shin, Dong-Il;Shin, Jae-Wan;Kim, Soo-Han;Kim, Seung-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.925-938
    • /
    • 2010
  • Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by filtering, load distribution, frame dropping, and other methods. Among these methods, one of the most effective is frame dropping, which reduces specified video frames for bandwidth diminution. In frame dropping, B-frames are dropped and then I- and P-frames are dropped, based on the dependency among the frames. This paper proposes a scheme for protecting copyrights by encryption, when frame dropping is applied to reduce the bandwidth of media based on the MPEG-4 file format. We designed two kinds of frame dropping: the first stores and then sends the dropped files and the other drops frames in real time when transmitting. We designed three kinds of encryption methods using the DES algorithm to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I-, P-VOP. Based on these three methods, we implemented a digital rights management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption, and the quality of the video sequences to select an optimal method, and found that there was no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in the encryption and decryption of frames was obtained when we applied the macro block and motion vector encryption in I-, P-VOP.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

A New Complex-Number Multiplication Algorithm using Radix-4 Booth Recoding and RB Arithmetic, and a 10-bit CMAC Core Design (Radix-4 Booth Recoding과 RB 연산을 이용한 새로운 복소수 승산 알고리듬 및 10-bit CMAC코어 설계)

  • 김호하;신경욱
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.9
    • /
    • pp.11-20
    • /
    • 1998
  • High-speed complex-number arithmetic units are essential to baseband signal processing of modern digital communication systems such as channel equalization, timing recovery, modulation and demodulation. In this paper, a new complex-number multiplication algorithm is proposed, which is based on redundant binary (RB) arithmetic combined with radix-4 Booth recoding scheme. The proposed algorithm reduces the number of partial product by one-half as compared with the conventional direct method using real-number multipliers and adders. It also leads to a highly parallel architecture and simplified circuit, resulting in high-speed operation and low power dissipation. To demonstrate the proposed algorithm, a prototype complex-number multiplier-accumulator (CMAC) core with 10-bit operands has been designed using 0.8-$\mu\textrm{m}$ N-Well CMOS technology. The designed CMAC core contains about 18,000 transistors on the area of about 1.60 ${\times}$ 1.93 $\textrm{mm}^2$. The functional and speed test results show that it can operate with 120-MHz clock at V$\sub$DD/=3.3-V, and its power consumption is given to about 63-mW.

  • PDF

Calculation Method of Transient Potential Rises of Horizontal Ground Electrodes Depending on Injection Point of the Ground Current (접지전류의 입사점에 따른 정보통신설비용 수평접지전극의 과도전위상승 계산 방법)

  • Ahn, Chang-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.197-203
    • /
    • 2014
  • When the lightning current is injected to the ground system of information and communication facilities, analysis of the transient potential rise in the ground system is one of main factors to effectively design the ground system. The performance of grounding systems is normally estimated with the grounding impedance and the transient potential rise which represents the electrical characteristics of the grounding system. The method for calculating the grounding impedance depending on the injection point of the lightning current was proposed. The delta-gap source model was proposed to calculate the grounding impedance in the case that the lightning current is injected to the center of the horizontal ground electrode. A new program which is possible to apply the frequency-dependent soil parameters using the Debye model was developed, because a commercial program for analyzing the performance of the grounding system can not apply to the frequency-dependent soil parameters. The experiment was carried out to confirm the availability of the simulation results with the same condition. Finally, the transient potential rises of a horizontal ground electrode depending on the lightning current waveforms were analyzed by using the results of the grounding impedance which is associated with the frequency-dependent soil parameters.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Hardware Design of SNR Estimator for Adaptive Satellite Transmission System (적응형 위성 전송 시스템을 위한 신호 대 잡음비 추정 회로 구현)

  • Lee, Jae-Ung;Kim, Soo-Seong;Park, Eun-Woo;Im, Chae-Yong;Yeo, Sung-Moon;Kim, Soo-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.148-158
    • /
    • 2008
  • This paper proposes an efficient signal to noise ratio (SNR) estimation algorithm and its hardware implementation for adaptive transmission system using M-ary modulation scheme. In this paper, we present the implementation results of the proposed algorithm for the second generation digital video broadcasting via satellite (DVB-S2) system, and the proposed algorithm can be tailored to the other communication systems using adaptive transmissions. We built a look-up table (LUT) using the theoretical background of the received signal distribution, and by using this LUT we need just two comparators and a counter for the hardware implementation. For this reason, the hardware of the proposed scheme produces accurate estimation results even with extremely low complexity. The simulation results investigated in this paper reveal that the proposed method can produce estimation results within the specified SNR range in the DVB-S2 system, and it requires a few hundreds of samples for average estimation error of about 1 dB.