• Title/Summary/Keyword: 모의코드

Search Result 306, Processing Time 0.028 seconds

Parallel Sub-filter Searching Structure and Parameter Decision Technique in Adaptive PN Code Acquisition Systems (적응형 확산 코드 동기획득 시스템에서의 병렬 부필터 탐색 구조와 파라미터 결정기법)

  • 한명수;류탁기;홍대식;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.688-695
    • /
    • 2003
  • In this paper, the parallel sub-filter searching structure to be adapted that divides a filter into several sub filters and the parameter decision technique to control adaptive parameters with power of received signal in the code acquisition system using adaptive filter are proposed. The numerical results for the system probabilities are derived that the code acquisition system using parallel sub-filter searching structure is statistically analyzed. Also, characteristic of the parameters in adaptive code acquisition system is analyzed by simulations and the parameter decision technique through SNRc estimation is explained. The system with parallel sub-filter searching structure outperforms by 1∼l.5 dB for 16 taps, 5∼6 dB for 64 taps. And the system with parameter decision technique works efficiently with the reasonable degree of degradation about 1 ∼2.5dB for 16 and 32 taps.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

Design a Platform for Balancing Mutual Values between Objects (객체들 간의 상호 가치 균형을 위한 플랫폼 설계)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.241-248
    • /
    • 2017
  • There are various problems in the process of developing the game. Especially, there is a lot of problems in testing the balance of the value of each object. This causes problems such as an increase in development cost and a delay in development time. Therefore, if there is a tool or simulator that can test the mutual value balance of each object in advance, this problem can be solved. However, currently there are few simulators, tools, and platforms that can analyze and evaluate the mutual value balance between these objects. In this paper, I designed a platform to evaluate and test the mutual value balance between these objects based on mock battle. The designed platform tests and evaluates the abilities of each object according to their attack and defense strengths. So, this reduces development costs and shortens development time.

Generating Method of an Unambiguous Correlation Function for AltBOC Signal Tracking (AltBOC의 코드 추적을 위한 비모호 상관함수 생성 기법)

  • Woo, Sunghyuk;Chae, Keunhong;Lee, Seong Ro;Park, Soonyoung;Yoon, Seokho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.957-963
    • /
    • 2015
  • The autocorrelation of an alternative binary offset carrier (AltBOC) signal provides an improved positioning accuracy because of its narrow main-peak. However, The AltBOC signal has a disadvantage that the autocorrelation of the AltBOC signal has multiple side-peaks which incur a severe positioning error. In this paper, we propose a generating method of an unambiguous correlation function for AltBOC signal tracking. Specifically, we first obtain symmetric partial correlation functions, and subsequently, we obtain an unambiguous correlation function by combining them. In numerical results, it is confirmed that the proposed correlation function provides better tracking error standard devation (TESD) performances comparing with the conventional correlation functions.

Multi-Cell Transmit Diversity Scheme for OFDMA Systems (OFDMA 시스템을 위한 다중 셀 전송 다양성 기법)

  • Seo, Bangwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.721-727
    • /
    • 2012
  • Since a conventional multi-cell transmit diversity scheme depends on the feedback from the user for the channel gain information, its performance gets to severely degrade when the channel varies fast due to the high mobility of the user. Also, transmit power of the base station cannot be fully used in the conventional scheme because only one transmit antenna is used for data transmission. In this paper, we propose a multi-cell transmit diversity scheme appropriate for fast fading channel. In the proposed scheme, channel-independent precoding vector is applied over all transmit antennas and different precoding vectors are applied for neighboring subcarriers so that the received signal is avoided to experience deep fading over multiple neighboring subcarriers. Simulation results show that the proposed scheme has better detector output signal-to-noise ratio (SNR) and bit error rate (BER) performances than the conventional scheme.

Blind MOE Interference Canceller for Multicarrier DS-CDMA Systems (다중 반송파 DS-CDMA 시스템을 위한 블라인드 MOE 간섭 제거기)

  • Woo Dae Ho;Byun Youn Shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1395-1401
    • /
    • 2004
  • In The objective of this paper is to apply blind minimum output energy multiuser detection method to multicarrier direct sequence code division multiple access system. The performance of MC/DS-CDMA is reduced due to multiple access. To increase the performance of system, we need to cancel multiple user components. Blind interference canceller is able to detect the desired's information with the only minimal information of the desired user. We evaluate the performance of the proposed receiver under Gaussian channel. Simulation results show that the proposed receiver has about 6[dB] gain of signal to noise ratio without multiple user interference and has about 3[dB] gain of SNR with multiple user interference. Also, the result of comparing the capacity of the active users shows that the proposed method has about 2 times capacity more than conventional method. As a conclusion, simulation results show that the proposed method has better performs better than conventional method.

HARQ Switching Metric of MIMO-OFDM Systems using Joint Tx/Rx Antenna Scheduling (송.수신 안테나 스케줄링에 기반한 MIMO-OFDM 시스템의 HARQ 스위칭 기법)

  • Kim, Kyoo-Hyun;Knag, Seoung-Won;Chang, Kyung-Hi;Jeong, Byung-Jang;Chung, Hyun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.519-536
    • /
    • 2007
  • In this paper, we combine the Hybrid-Automatic Repeat reQuest (HARQ) algorithm with joint Tx and Rx antenna selection based on the reliability of the individual antennas links. The cyclic redundancy check (CRC) is applied on the data before being encoded using the Turbo encoder. In the receiver the CRC is used to detect errors of each antenna stream and to decide whether a retransmission is required or not. The receiver feeds back the transmitter with the Tx antennas ordering and the acknowledgement of each antenna (ACK or NACK). If the number of ACK antennas is higher than the NACK antennas, then the retransmission takes place from the ACK antennas using the Chase Combining (CC). If the number of the NACK antennas is higher than the ACK antennas then the ACK antennas are used to retransmit the data streams using the CC algorithm and additional NACK antennas are used to retransmit the remaining streams using Incremental Redundancy (IR, i.e. the encoder rate is reduced). Furthermore, the HARQ is used with the I-BLAST (Iterative-BLAST) which grantees a high transmission rate.

A Study on Iterative MAP-Based Turbo Code over CDMA Channels (CDMA 채널 환경에서의 MAP 기반 터보 부호에 관한 연구)

  • 박노진;강철호
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.12a
    • /
    • pp.13-16
    • /
    • 2000
  • In the recent mobile communication systems, the performance of Turbo Code using the error correction coding depends on the interleaver influencing the free distance determination and the recursive decoding algorithms that is executed in the turbo decoder. However, performance depends on the interleaver depth that need great many delay over the reception process. Moreover, Turbo Code has been known as the robust coding methods with the confidence over the fading channel. The International Telecommunication Union(ITU) has recently adopted as the standardization of the channel coding over the third generation mobile communications the same as IMT-2000. Therefore, in this paper, we proposed of that has the better performance than existing Turbo Decoder that has the parallel concatenated four-step structure using MAP algorithm. In the real-time voice and video service over the third generation mobile communications, the performance of the proposed method was analyzed by the reduced decoding delay using the variable decoding method by computer simulation over AWGN and lading channels.

  • PDF

Start-up circuit with wide supply swing voltage range and modified power-up characteristic for bandgap reference voltage generator. (넓은 전압 범위와 개선된 파워-업 특성을 가지는 밴드갭 기준전압 발생기의 스타트-업 회로)

  • Sung, Kwang-Young;Kim, Jong-Hee;Kim, Tae-Ho;Vu, Cao Tuan;Lee, Jae-Hyung;Lim, Gyu-Ho;Park, Mu-Hum;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1544-1551
    • /
    • 2007
  • A start-up circuit of the bandgap reference voltage generator of cascode current mirror type with wide operating voltage range and enhanced power-up characteristics is proposed in the paper. It is confirmed by simulation that the newly proposed start-up circuit does not affect the operation of the bandgap reference voltage generatory even though the supply voltage(VDDA) is higher and has more stable power-up characteristic than the conventional start-up circuit. Test chips are designed and fabricated with $0.18{\mu}m$ tripple well CMOS process and their test has been completed. The mean value of measured the reference voltage(Vref) is 738mV and The three sigma value($3{\sigma}$) is 29.88mV.

Optical Encryption of Binary Information using 2-step Phase-shifting Digital Holography (2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 정보 광 암호화 기법)

  • Byun, Hyun-Joong;Gil, Sang-Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.401-411
    • /
    • 2006
  • We propose an optical encryption/decryption technique for a security system based on 2-step phase-shifting digital holography. Phase-shilling digital holography is used for recording phase and amplitude information on a CCD device. 2-step phase-shifting is implemented by moving the PZT mirror with phase step of 0 or ${\pi}/2$. The binary data and the key are expressed with random code and random phase patterns. The digital hologram is a Fourier transform hologram and is recorded on CCD with 256 gray level quantization. We remove the DC term of the digital hologram fur data reconstruction, which is essential to reconstruct the original binary input data/image. The error evaluation fer the decrypted binary data is analyzed. One of errors is a quantization error in detecting the hologram intensity on CCD, and the other is generated from decrypting the data with the incorrect key. The technique using 2-step phase-shifting holography is more efficient than a 4-step method because 2-step phase-shifting holography system uses less data than the 4-step method for data storage or transmission. The simulation shows that the proposed technique gives good results fur the optical encryption of binary information.