• Title/Summary/Keyword: 변조분류

Search Result 77, Processing Time 0.03 seconds

RFID Tag 기술

  • 변상기
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.2
    • /
    • pp.32-43
    • /
    • 2004
  • RFID 시스템에서 태그는 리더와 전자기 에너지 교환에 의해 동작을 하며 배터리를 사용하는 active 형 태그와 배터리를 사용하지 않는 passive형 태그로 크게 구분된다. 또한 태그는 자체 회로구조에 의해 harmonic 태그, anharmonic 태그, sequenced amplifier 태그로 나뉜다. Passive 태그에서는 리더의 반송파 backscatter 방식을 이용하여 동작을 하며 active 태그는 자체 발진회로에 의해 태그정보를 송신한다. 태그의 변조방식으로 PSK, FSK, ASK 등을 사용하며 변조방법에 따라 회로 구성과 프로토콜 설계가 달라진다. 또한 리더의 전파 신호를 정류하기 위하여 렉테나(rectenna)가 필요하다. 본 논문에서는 태그의 분류, 동작, 구조 등에 관한 일반적인 내용을 기술하였다. 특히 UHF 대역 이상의 태그 기술 최근 추세가 안테나 부분을 제외하고 CMOS one chip화 하는 수준으로서 900 MHz UHF 대역, 2.45 GHz RFID 칩이 상용화 되어 있다. 칩의 내부구조와 태그의 변조방식에 의거한 동작에 관한 개괄적인 내용을 서술하였다.

Fast Modulation Classifier for Software Radio (소프트웨어 라디오를 위한 고속 변조 인식기)

  • Park, Cheol-Sun;Jang, Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.425-432
    • /
    • 2007
  • In this paper, we deals with automatic modulation classification capable of classifying incident signals without a priori information. The 7 key features which have good properties of sensitive with modulation types and insensitive with SNR variation are selected. The numerical simulations for classifying 9 modulation types using the these features are performed. The numerical simulations of the 4 types of modulation classifiers are performed the investigation of classification accuracy and execution time to implement the fast modulation classifier in software radio. The simulation result indicated that the execution time of DTC was best and SVC and MDC showed good classification performance. The prototype was implemented with DTC type. With the result of field trials, we confirmed the performance in the prototype was agreed with the numerical simulation result of DTC.

Research on the Detection of Image Tampering

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.111-121
    • /
    • 2021
  • As the main carrier of information, digital image is becoming more and more important. However, with the popularity of image acquisition equipment and the rapid development of image editing software, in recent years, digital image counterfeiting incidents have emerged one after another, which not only reduces the credibility of images, but also brings great negative impacts to society and individuals. Image copy-paste tampering is one of the most common types of image tampering, which is easy to operate and effective, and is often used to change the semantic information of digital images. In this paper, a method to protect the authenticity and integrity of image content by studying the tamper detection method of image copy and paste was proposed. In view of the excellent learning and analysis ability of deep learning, two tamper detection methods based on deep learning were proposed, which use the traces left by image processing operations to distinguish the tampered area from the original area in the image. A series of experimental results verified the rationality of the theoretical basis, the accuracy of tampering detection, location and classification.

Classification of Radio Signals Using Wavelet Transform Based CNN (웨이블릿 변환 기반 CNN을 활용한 무선 신호 분류)

  • Song, Minsuk;Lim, Jaesung;Lee, Minwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1222-1230
    • /
    • 2022
  • As the number of signal sources with low detectability by using various modulation techniques increases, research to classify signal modulation methods is steadily progressing. Recently, a Convolutional Neural Network (CNN) deep learning technique using FFT as a preprocessing process has been proposed to improve the performance of received signal classification in signal interference or noise environments. However, due to the characteristics of the FFT in which the window is fixed, it is not possible to accurately classify the change over time of the detection signal. Therefore, in this paper, we propose a CNN model that has high resolution in the time domain and frequency domain and uses wavelet transform as a preprocessing process that can express various types of signals simultaneously in time and frequency domains. It has been demonstrated that the proposed wavelet transform method through simulation shows superior performance regardless of the SNR change in terms of accuracy and learning speed compared to the FFT transform method, and shows a greater difference, especially when the SNR is low.

Improving crash classification with crash image and deep clustering (크래시된 이미지와 딥 클러스터링을 통한 크래시 분류 개선)

  • Kim, Yo-Han;Lee, Sang-Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.809-812
    • /
    • 2019
  • 소프트웨어 크래시 분류를 개선하기 위해 호출 스택 정보를 기반한 많은 연구들이 있다. 본 연구에서는 크래시 직전 이미지를 수집하여, 기존 호출 스택 기반의 분류에서 발생하는 문제를 개선하고자 한다. 또한 이미지 자체의 직관성으로 개발자뿐만 아니라 개발 지식이 없는 실무자도 크래시 정보를 활용할 수 있고, 문제 해결을 위한 재현 루트 파악, 위변조 여부와 같은 추가 정보를 확인할 수 있을 것으로 기대한다. 비지도 학습 기반인 딥러닝 클러스터링 N2D 알고리즘을 통하여 이미지를 자동 분류하고 순위화하는 시스템을 구축하여, 특정 소프트웨어에 특화되지 않고 다양한 소프트웨어의 크래시 이미지 자동 분류에 기여할 수 있을 것으로 기대한다.

3상 Thyristor Inverter동작 Mode의 Vector해석법 1

  • 황영문
    • 전기의세계
    • /
    • v.23 no.4
    • /
    • pp.32-35
    • /
    • 1974
  • Thyristor inverter의 유형은 Switching기능에 따라 분류하고 있는데, 크게 나누어 Bridge형 converter와 Cycloconverter로 나누는데, 여기서는 이중 3상 Bridge형 Thyristor Inverter에 대한 전력변환과정을 Vector해석법에 의하여 그 개요를 설명하고, 여기에 현재 가장 효율적 switching방식이라 보고 있는 펼스폭변조환류게이트방식(Pulsewidth modulation commutation gating system)을 적용하였을 때의 효과를 첨가 설명코자 한다.

  • PDF

Forensic Classification of Median Filtering by Hough Transform of Digital Image (디지털 영상의 허프 변환에 의한 미디언 필터링 포렌식 분류)

  • RHEE, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.5
    • /
    • pp.42-47
    • /
    • 2017
  • In the distribution of digital image, the median filtering is used for a forgery. This paper proposed the algorithm of a image forensics detection for the classification of median filtering. For the solution of this grave problem, the feature vector is composed of 42-Dim. The detected quantity 32, 64 and 128 of forgery image edges, respectively, which are processed by the Hough transform, then it extracted from the start-end point coordinates of the Hough Lines. Also, the Hough Peaks of the Angle-Distance plane are extracted. Subsequently, both of the feature vectors are composed of the proposed scheme. The defined 42-Dim. feature vector is trained in SVM (Support Vector Machine) classifier for the MF classification of the forged images. The experimental results of the proposed MF detection algorithm is compared between the 10-Dim. MFR and the 686-Dim. SPAM. It confirmed that the MF forensic classification ratio of the evaluated performance is 99% above with the whole test image types: the unaltered, the average filtering ($3{\times}3$), the JPEG (QF=90 and 70)) compression, the Gaussian filtered ($3{\times}3$ and $5{\times}5$) images, respectively.

Radar Signal Pattern Recognition Using PRI Status Matrix and Statistics (PRI 상태행렬과 통계값을 이용한 레이더 PRI 신호패턴 인식)

  • Lee, Chang-ho;Sung, Tae-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.775-778
    • /
    • 2016
  • In this paper, we propose a new method to automatically recognize PRI modulation type of radar signal at ES(Electronic Support) in electronic singal environment. The propose method stores pattern of PRI(Pulse Repetition Interval) of radar signal and uses statistic data, which firstly classifies into 2 classes. Then the proposed method recognizes each PRI signal using statistic characteristic of PRI. We apply various 5 kinds of PRI signal such as constant PRI, jitter PRI, D&S(dwell & switch) PRI, stagger PRI, sliding PRI, etc. The result shows the proposed method correctly identifies various PRI signals.

  • PDF

A tamper resistance software mechanism using MAC function and dynamic link key (MAC함수와 동적 링크키를 이용한 소프트웨어 변조 방지 기법)

  • Park, Jae-Hong;Kim, Sung-Hoon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.11-18
    • /
    • 2013
  • In order to prevent tampering and reverse engineering of executive code, this paper propose a new tamper resistant software mechanism. This paper presents a cryptographic MAC function and a relationship which has its security level derived by the importance of code block instead of by merely getting the encryption and decryption key from the previous block. In this paper, we propose a cryptographic MAC function which generates a dynamic MAC function key instead of the hash function as written in many other papers. In addition, we also propose a relationships having high, medium and low security levels. If any block is determined to have a high security level then that block will be encrypted by the key generated by the related medium security level block. The low security block will be untouched due to efficiency considerations. The MAC function having this dynamic key and block relationship will make analyzing executive code more difficult.

Crest Factors of 16-QAM Modulated Multicode MC-CDMA Signals Employing Complementary Sequences (이진 상보형 수열 쌍을 대역확산 부호로 사용하고 16-QAM 변조 기법을 이용한 MC-CDMA 신호의 전력 포락선 특성 분석)

  • Choi Byoung-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9C
    • /
    • pp.817-824
    • /
    • 2006
  • The crest factor properties of 16-QAM modulated one- and two-code assisted multi-carrier code-division multiple-access (MC-CDMA) signals employing complementary pair as spreading sequences are characterized. It is shown that a set of relationship between the two 16-QAM symbols entirely characterize the power envelope waveforms of the signals. There exists 60 different sets of relationship, which results in 16 different crest factors as a result of various equivalent transforms on the corresponding message symbols. It is also shown that the individual crest factor corresponding to each message combination is always bounded by 3dB.