• Title/Summary/Keyword: one-one code

Search Result 2,572, Processing Time 0.032 seconds

Simulative Investigation of Spectral Amplitude Coding Based OCDMA System Using Quantum Logic Gate Code with NAND and Direct Detection Techniques

  • Sharma, Teena;Maddila, Ravi Kumar;Aljunid, Syed Alwee
    • Current Optics and Photonics
    • /
    • v.3 no.6
    • /
    • pp.531-540
    • /
    • 2019
  • Spectral Amplitude Coding Optical Code Division Multiple Access (SAC OCDMA) is an advanced technique in asynchronous environments. This paper proposes design and implementation of a novel quantum logic gate (QLG) code, with code construction algorithm generated without following any code mapping procedures for SAC system. The proposed code has a unitary matrices property with maximum overlap of one chip for various clients and no overlaps in spectra for the rest of the subscribers. Results indicate that a single algorithm produces the same length increment for codes with weight greater than two and follows the same signal to noise ratio (SNR) and bit error rate (BER) calculations for a higher number of users. This paper further examines the performance of a QLG code based SAC-OCDMA system with NAND and direct detection techniques. BER analysis was carried out for the proposed code and results were compared with existing MDW, RD and GMP codes. We demonstrate that the QLG code based system performs better in terms of cardinality, which is followed by improved BER. Numerical analysis reveals that for error free transmission (10-9), the suggested code supports approximately 170 users with code weight 4. Our results also conclude that the proposed code provides improvement in the code construction, cross-correlation and minimization of noises.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

In Image Recognition Algorithm for Bar-Code Recognition/Inspection (바코드 인식/검사를 위한 영상인식 알고리즘)

  • 김기순;최종문;김준식
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.3
    • /
    • pp.1-8
    • /
    • 2001
  • In this paper, we proposed the automatical recognition algorithm of bar-code using a vision system, which can be used in the industrial application(code 93). The proposed algorithm extracts the pixels which consist of the bar-code modules unrelated to rotation, then that obtains the elements which consist of bars and spaces. After the obtained elements are divided by nine group, the value of bar-code is recognized. The performance of proposed algorithm is verified through the simulation. The proposed one has good performance.

  • PDF

Wind Turbine Simulation Program Development using an Aerodynamics Code and a Multi-Body Dynamics Code (풍력발전시스템의 유연체 다물체 동역학 시뮬레이션 프로그램 개발)

  • Song, Jin-Seop;Rim, Chae-Whan;Nam, Yong-Yun;Bae, Dae-Sung
    • New & Renewable Energy
    • /
    • v.7 no.4
    • /
    • pp.50-57
    • /
    • 2011
  • A wind turbine simulation program for the coupled dynamics of aerodynamics, elasticity, multi-body dynamics and controls of turbine is newly developed by combining an aero-elastic code and a multi-body dynamics code. The aero-elastic code, based on the blade momentum theory and generalized dynamic wake theory, is developed by NREL(National Renewable Energy Laboratory, USA). The multi-body dynamics code is commercial one which is capable of accounting for geometric nonlinearity and twist deflection. A turbulent wind load case is simulated for the NREL 5-MW baseline wind turbine model by the developed program and FAST. As a result, the two results agree well enough to verify the reliability of the developed program.

CDLint: A Cloud Service for Dynamic Analysis of JavaScript Code

  • Liu, Xiao;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.633-636
    • /
    • 2017
  • This paper presents a cloud service called CDLint for checking and analyzing the Javascript code dynamically. The correctness of Javascript code is becoming more important since it can also run on the server side as well as the client side. There are several analysis systems for checking the bad code in JavaScript but they seem like have one or more weaknesses. CDLint is developed based on an existing work named DLint which is a powerful bad JavaScript checker. Compared with similar systems, CDLint shows the best performances with respect to the system extensibility, the freedom to use without installation, the automatic parsing of JavaScript code from website, and the environment configuration for JavaScript code checking.

Error Correction Algorithms for High-density Optical Storage Systems (고밀도 광 기록 저장 시스템을 위한 에러 정정 알고리즘)

  • Yang Gi-Joo;Lee Jae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.659-664
    • /
    • 2006
  • We propose two error correcting algorithms for high-density optical storage systems. The first algorithm reduces the false-erasure declaration by reducing the sensitivity on random errors and increases the code rate using a simple erasure indication method. The second one exploits just the known indicator flag instead of error correcting code such as Reed-Solomon(RS) code. The proposed algorithms are superior to the error correcting algorithms of conventional systems such as DVD and BD.

A Study on the Bar-Code Image Recognition Algorithm unrelated to Rotation / Distance (회전 및 거리에 무관한 바코드 영상인식 알고리즘에 관한 연구)

  • 김기순;최종문;김준식
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2001.06a
    • /
    • pp.273-276
    • /
    • 2001
  • In this paper, we proposed the automatical recognition algorithm of bar-code using a vision system, which can be used in the industrial application(code 93). The proposed algorithm extracts the pixels which consist of the bar-code modules unrelated to rotation, then that obtains the elements which consist of bars and spaces. After the obtained elements are divided by nine group, the value of bar-code is recognized. The performance of proposed algorithm is verified through the simulation. The proposed one has good performance.

  • PDF

Legal Implications of the ISPS Code on Contract of Carriage by Sea (국제해상보안규정(ISPS Code)의 시행이 해상법에 미칠 영향)

  • Yang, Jung-Ho;Myung, Chang-Sig
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.217-250
    • /
    • 2008
  • The International Ship and Port Facility Security (ISPS) Code which was developed as the main response of the shipping sector to the miserable event of 11 September 2001 came into effect on 1 July 2004. The ISPS Code designed to detect and eliminate security threats affecting ships and port facilities used in international trade will significantly impact not only on the management and operation of the shipping industry but also on maritime law despite the fact that it is the regulatory framework of public law. It is expected that implementing the ISPS Code will contribute to reinforcement of maritime security on the one hand. However, on the other hand, more intensified security inspection and control measures of port states will also cause delay and additional costs which cause uncertainty in allocating security risk and cost between the contracting parties. Therefore, it is desire to insert new security clause dealing with main security issues or adapt existing clauses to new shipping environments to minimize disputes.

  • PDF

GPS L5 Acquisition Schemes for Fast Code Detection and Improved Doppler Accuracy

  • Joo, In-One;Sin, Cheon-Sig;Lee, Sang-Uk;Kim, Jae-Hoon
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.142-144
    • /
    • 2010
  • In this letter, we propose GPS L5 acquisition schemes to detect a fast code phase and improve the accuracy of the Doppler frequency. The proposed approach is based on the code-phase changes which occur during the acquisition processing time originating in the Doppler frequency. The proposed schemes detect a fast code phase within about 1 chip near the estimated code phase and improve the accuracy of the Doppler frequency by up to about 4 times in comparison with the popular Septentrio receiver. The feasibility of the proposed schemes is demonstrated through simulation.

Transform Trellis Image Coding Using a Training Algorithm (훈련 알고리듬을 이용한 변환격자코드에 의한 영상신호 압축)

  • 김동윤
    • Journal of Biomedical Engineering Research
    • /
    • v.15 no.1
    • /
    • pp.83-88
    • /
    • 1994
  • The transform trellis code is an optimal source code as a block size and the constraint length of a shift register go to infinite for stationary Gaussian sources with the squared-error distortion measure. However to implement this code, we have to choose the finite block size and constraint length. Moreover real-world sources are inherently non stationary. To overcome these difficulties, we developed a training algorithm for the transform trellis code. The trained transform trellis code which uses the same rates to each block led to a variation in the resulting distortion from one block to another. To alleviate this non-uniformity in the encoded image, we constructed clusters from the variance of the training data and assigned different rates for each cluster.

  • PDF