• Title/Summary/Keyword: pseudo random sequence

Search Result 108, Processing Time 0.023 seconds

Performance of PN Code Based Time Hopping Sequences in M-ary Ultra Wide Band Multiple Access Systems Using Equicorrelated Signal Sets (동일 상관 신호군을 이용하는 M-ary UWB 다원 접속 시스템에서 PN 부호 기반 시간 도약 시퀀스의 성능)

  • 양석철;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10A
    • /
    • pp.816-829
    • /
    • 2003
  • In this paper, we evaluate the performance of PN (Pseudo Noise) code based time hopping sequences for M-ary UWB (Ultra Wide Band) multiple access systems using the equicorrelated signal sets. In particular, we consider two different types of M-ary UWB systems in UWB indoor wireless multipath channels: The first type of the systems (System #1) has identical symbol transmission rate regardless of the number of symbols M since the length of signal pulse train is fixed while M increases, and the second type of the systems (System #2) has the same bit transmission rate regardless of M since the length of signal pulse train is extended according to the increase of M. We compare the proposed systems with those using the ideal random time hopping sequence in terms of the symbol error rate performance. Simulation results show that the PN code based time hopping sequence achieves quite good performance which is favorably comparable to that of the ideal random sequence. Moreover, as M increases, we observe that System #2 shows better robustness against multiple access interference than System # 1.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

A Hybrid RPWM Technique using Logical Composition of a RSF and a RPP (RSF와 RPP의 논리적인 조합을 이용한 하이브리드 RPWM기법)

  • Kim K. S.;Jung Y. G.;Lim Y. C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07a
    • /
    • pp.411-414
    • /
    • 2004
  • 본 연구에서는 RPP(Randomized Pulse Position PWM)의 특징과 RSF(Random Switching Frequency PWM)의 특징을 모두 갖는 하이브리드 RPWM (Random PWM)기법을 제안하였다. 제안된 방법은 PRBS(Pseudo-Random Binary Sequence)로 동작하는 시프트 레지스터의 lead-lag 랜덤 비트를 사용한다는 점에서 종전의 방법과 동일하나, 이와 논리적인 비교를 위해 랜덤 주파수의 삼각파를 이용한다는 점에서 종전의 방법과 다르다. 본 연구의 타당성을 확인하기 위하여 인버터 기반의 3상 유도모터 구동시스템에 제안된 방법을 적용하였다. 그 결과 종전의 방법에 비하여 인버터 구동 유도모터의 전압 및 전류의 고조파 스펙트럼의 광 대역화에 탁월한 효과가 있음을 입증할 수 있었다.

  • PDF

A Hybrid Random Pulse Width Modulation(HRPWM) Technique Using LF2407 DSP Controller (LF2407 DSP제어기를 사용한 혼합형 랜덤 펄스폭 변조(HRPWM)기법)

  • Kim K.S.;Jung Y.G.;Lim Y.C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.11a
    • /
    • pp.101-105
    • /
    • 2004
  • 본 연구에서는 LF2407 DSP제어기를 사용한 혼합형 랜덤 펄스폭 변조기법(HRPWM : Hybrid Random PWM)을 제안하였다. 제안된 HRPWM은 PRBS (Pseudo-Random Binary Sequence)로 동작하는 시프트 레지스터의 lead-lag 랜덤 비트를 사용한다는 점에서 종전의 방법과 동일하다. 그러나 Lead-Lag 랜덤 비트와 논리적인 비교를 하기 위해 고정 주파수의 캐리어를 사용 하지 않고 랜덤 주파수의 삼각파 캐리어를 이용한다는 점이 종전의 방법과 다르다. LF2407 DSP에 의하여 랜덤 수 및 PRBS 그리고 3상 기준 정현파를 실시간으로 발생하며, DSP외부의 주파수 변조기 MAX038에 의하여 랜덤 주파수의 캐리어를 발생한다. 제안된 기법을 LF2407기반의 3상 유도모터 구동장치에 적용한 결과, 모터 전류파형은 종전의 방법과 유사한 파형을 유지하면서도 모터 전압 및 전류의 고조파 스펙트럼은 광대역 주파수로 분포시킬 수 있었다.

  • PDF

Digital Audio Watermarking Based on Spread Spectrum Techniques (스프레드 스펙트럼 기반 디지털 오디오 워터마킹 기법 연구)

  • 진창윤;최창렬;정제창
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.257-260
    • /
    • 2001
  • In this paper, we propose a robust audio watermarking method. The proposed watermarking algorithm is composed of a psychoacoustic model to achieve perceptual transparency and spread spectrum technique to embed watermark. The watermark is embedded in each audio frame by adding a perceptually-shaped pseudo-random sequence. We demonstrate the robustness of the watermarking algorithm.

  • PDF

Legender 기호와 암호학

  • Oh, Jeong-Hwan;Kim, Cheol
    • Review of KIISC
    • /
    • v.2 no.2
    • /
    • pp.25-30
    • /
    • 1992
  • 본 논제에서는 원시근과 이차 잉여규를 중심으로 관련되는 암호학에 이용을 언급하기로 한다. 이외에도 이산로그(discrete logarithm), 연분수(conti-nued fraction), 여러 부정방정식(diophantine equation)의 이론등이 암호학에서 빈번히 사용되는 알고리즘의 근간을 이루는 이론들로 알려져 있다. 또한, 유사임의 수열(pseudo-random number sequence)을 만들기 위한 생성자 (generator)들 중에는 정수론에 기초하고 있는 것들이 않이 있다. 제2절에서는 정수의 위수와 원시근에 대한 성질을 논하고, 제 3절에서는 2차 잉여류와 Legender 기호를 소개한 후, 제4절에서 이들이 주로 사용되는 암호학의 분야를 논하기로 한다.

  • PDF

A New Robust Watermark Embedding into Wavelet DC Components

  • Joo, Sang-Hyun;Suh, Young-Ho;Shin, Jae-Ho;Kikuchi, Hisakazu
    • ETRI Journal
    • /
    • v.24 no.5
    • /
    • pp.401-404
    • /
    • 2002
  • In this paper, we propose a non-blind watermarking method that embeds a pseudo-random sequence (watermarks) into wavelet DC components. The DC area is not suitable for embedding because of severe visual degradation. We overcome the degradation problem by embedding watermarks into visually insensitive locations. We compare our experimental results with respect to JPEG compression with Cox’s popular correlation-based method. We also compare the robustness of our technique with other methods registered in CheckMark. This study reveals that the proposed method simultaneously provides good fidelity in quality as well as robustness against external attacks.

  • PDF

A Study on Multi-Carrier CDMA in Rayleigh Fading Channel (레일레이 폐이딩환경에서의 다중반송파 CDMA방식에 관한 연구)

  • 홍우상;한영열
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.11a
    • /
    • pp.127-135
    • /
    • 1997
  • In this paper, we apply a digital modulation scheme called Multi-Carrier Code Division Multiple Access (MC-CDMA) in which data symbols are transmitted at multiple subcarriers. Each subcarrier is encoded with a phase offset of -π or π based on a pseudo-random noise(PN) sequence. MC-CDMA scheme is introduced to combat against the multipath fading. We annalize above system and derive the average probability of error in AWGN and Rayleigh fading environment.

  • PDF

A Blind Watermarking Technique Using Difference of Approximation Coefficients in Wavelet Domain (웨이블릿 영역에서 근사 계수의 증감 정보를 이용한 블라인드 워터마크)

  • 윤혜진;성영경;최태선
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.219-222
    • /
    • 2002
  • In this paper, we propose a new blind image watermarking method in wavelet domain. It is necessary to find out watermark insertion location in blind watermark. We use horizontal and vertical difference of LL components to select watermark insertion location, because increment or decrement of successive components is rarely changed in LL band. A pseudo-random sequence is used as a watermark. Experimental results show that the proposed method is robust to various kinds of attacks such as JPEG lossy compression, averaging, median filtering, resizing, histogram equalization, and additive Gaussian noise.

  • PDF

Identification of Volterra Kernels of Nonlinear Van do Vusse Reactor

  • Kashiwagi, Hiroshi;Rong, Li
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.109-113
    • /
    • 2002
  • Van de Vusse reactor is known as a highly nonlinear chemical process and has been considered by a number of researchers as a benchmark problem for nonlinear chemical process. Various identification methods for nonlinear system are also verified by applying these methods to Van de Vusse reactor. From the point of view of identification, only the Volterra kernel of second order has been obtained until now. In this paper, the authors show that Volterra kernels of nonlinear Van de Vusse reactor of up to 3rd order are obtained by use of M-sequence correlation method. A pseudo-random M-sequence is applied to Van de Vusse reactor as an input and its output is measured. Taking the crosscorrelation function between the input and the output, we obtain up to 3rd order Volterra kernels, which is the highest order Volterra kernel obtained until now for Van de Vusse reactor. Computer simulations show that when Van de Vusse chemical process is identified by use of up to 3rd order Volterra kernels, a good agreement is observed between the calculated output and the actual output.