• Title/Summary/Keyword: 변조 및 코딩기법

Search Result 28, Processing Time 0.02 seconds

Mobile WiMAX Relay System with Dynamic Modulation and Coding Scheme for Multicast Broadcast Service (동적인 변조 및 코딩 기술을 이용한 모바일 와이맥스 MBS 중계 시스템)

  • Cho, Chi-Hyun;Youn, Hee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.234-242
    • /
    • 2010
  • The demand on various broadcasting services has been greatly increasing in the area of mobile communication. In IEEE802.16e standard and mobile WiMAX, the multicast broadcast service (MBS) uses shared downlink channel for efficiently supporting a number of users. In this paper we propose a dynamic modulation and coding scheme with relay network to enhance the performance of MBS. The proposed approach employs the adaptive modulation and coding scheme for both the base station and relay station to achieve consistently high throughput. The result of computer simulation with NS-2 shows that the throughput and transmission time are significantly improved by using the proposed approach compared to the existing schemes having a fixed modulation level for the RSs.

Study on algorithm of blind modulation detector in EDGE systems (EDGE 시스템에서 블라인드 변조 검출기의 알고리즘에 관한 연구)

  • Park, Hong-Won;Moon, Hong-Youl;Woo, Sung-Hyun;Kim, Jin-Hee
    • Aerospace Engineering and Technology
    • /
    • v.9 no.1
    • /
    • pp.67-71
    • /
    • 2010
  • In this study, an algorithm for blind modulation detection in EDGE systems is presented. EDGE introduces an 8PSK modulation to provide high-speed data rates in addition to the existing GSM system. A transmitter may switch dynamically the modulation and coding schemes for transmission of data according to the channel quality. To decode the data correctly, the receiver has to detect using only training sequence which modulation is being used. Basically the property of one radio block composed of four bursts to detect effectively the modulation scheme even under severe conditions is used. More specifically, the reference value calculated for received burst is accumulated with previous reference value to minimize statistically the false detection probability in one radio block. Also each burst data having different modulation from the modulation of the fourth burst is set to zero to improve the decoding performance because the reference of the fourth burst has the highest reliability.

Non-Orthogonal Multiple Access based Phase Rotation Index Modulation (비직교 다중 접속 기반 위상 회전 인덱스 변조 기법)

  • Lee, Hye Yeong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.267-273
    • /
    • 2021
  • Non-orthogonal multiple access is the promised candidates in the next generation wireless networks to improve the spectral efficiency by superposing multiple signals. In general, the superposition coding is performed using the difference in channel gain between users based on the user's power allocation. However, when user pairs have the similar channel gain problem, NOMA can not be allowed in the scenario. To overcome this problem, phase rotation based NOMA is presented to increase minimum distance between superposed signals in the constellation point. This paper proposed a novel non-orthogonal multiple access based index modulation using phase rotation. The additional bits can transfer using the index bits that is allocated according to the activated state of the phase rotation. Simulation results are shown that bit error rate and achievable sum rate are better than conventional NOMA.

Implementation of Spread Spectrum FTS Encoder/Decoder (대역확산방식 FTS 인코더/디코더 구현)

  • Lim, You-Chol;Ma, Keun-Soo;Kim, Myung-Hwan;Lee, Jae-Deuk
    • Aerospace Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.179-186
    • /
    • 2009
  • This paper describes the design and implementation for spread spectrum FTS encoder and decoder. The FTS command format is defined by 64 bit encrypted packet that contains all required information relayed between the ground and the vehicle. Encryption is accomplished using the Tripple-DES encryption algorithm in block encryption form. The proposed FTS encoder and decoder is using the Convolution Encoding and Viterbi Decoding for forward error correction. The Spread Spectrum Modulation is done using a PN code, which is 256 bit gold code. The simulation result shows that the designed FTS decoder is compatible with the designed FTS encoder.

  • PDF

Adaptive Channel Attenuation Compensation Scheme for Minimum PAR in Satellite OFDMA Downlink (위성 OFDMA Downlink에서 PAR을 최소화 하기 위한 사용자 부채널 할당 및 채널 보상 기법)

  • Kim, Han-Nah;Choi, Kwon-Hue;Ahn, Do-Seob;Kang, Kun-Seok;Kim, Hee-Wook
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.1
    • /
    • pp.28-35
    • /
    • 2009
  • We investigate the adaptive channel attenuation compensation of satellite OFDMA downlink users for minimum PAR (Peak to Average power Ratio), which is one of the main challenging issues in satellite OFDMA application. First, we analyze and compare PAR performances of two main different channel attenuation compensation schemes for OFDMA, i.e., PC-OFDMA (power control OFDMA) and AMC-OFDMA (Adaptive Modulation and Coding). While AMC-OFDMA maintains the constant transmission powers through entire user data subcarriers, PC-OFDMA has non-uniform subcarrier transmission powers because subcarrier powers are separately controlled to compensate each user's sub-channel attenuation. We newly found the fact that non-uniform subcarrier power in PC-OFDMA achieves rather reduced PAR compared to AMC-OFDMA and the amount of reduction becomes larger as the power differences among subcarriers increase. Also, there is an additional PAR reduction in PC-OFDMA by optimizing subcarrier grouping scheme for user's sub-channelization.

  • PDF

Limitations of Spectrogram Analysis for Smartphone Voice Recording File Forgery Detection (스마트폰 음성 녹음 파일 위변조 검출을 위한 스펙트로그램 분석의 한계점)

  • Sangmin Han;Yeongmin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.545-551
    • /
    • 2023
  • As digital information is readily available to everyone today, the adoption of digital evidence is increasing. However, it is virtually impossible to determine the authenticity of forgery in the case of a voice recording file that has gone through a sophisticated editing process along with the spread of various voice file editing tools. This study aims to prove that forgery, which is difficult to distinguish from the original file, is possible by using insertion, deletion, linking, and synthetic editing technologies in voice recording files. This study presents the difficulty of detecting forgery by encoding a forged voice file with the same extension as the original. In addition, it was shown that forgery detection is impossible if additional transition band deletion and secondary encoding are performed only for experiments in which features occurred. Through this, this study is expected to contribute to the establishment of more stringent evidence admissibility criteria for adopting voice recording files as digital evidence.

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

HSPA Evolution

  • Lee, Yeong-Yong
    • Information and Communications Magazine
    • /
    • v.24 no.3
    • /
    • pp.87-96
    • /
    • 2007
  • HSPA는 HSDPA 및 HSUPA를 통합하여 일컫는 3GPP 기술로 하향 링크에서는 HSDPA를 상향 링크에서는 HSUPA를 사용하여 기존 DCH만을 사용하는 3GPP Release 99 시스템 대비 더 효율적인 고속 멀티미디어 서비스를 제공하는 기술이다. HSDPA는 3GPP Release 5 기술로서 2002년 3월 첫 표준이 승인되었으며 단말의 무선 환경에 따라 변조 및 코딩기법을 변화시키는 AMC, 물리 계층을 통해 빠른 재전송을 지원하는 HARQ,단축된 2ms TTI 그리고 Node-B 기반의 고속 스케줄링을 통해 무선망 성능을 획기적으로 향상시켜 하향 링크에서 최대 14.4Mbps를 제공한다. HSUPA는 3GPP Release 6 기술로서 2004년 6월 첫 표준이 승인되었으며 HSDPA에 도입한 기술들 중에서 AMC를 제외한 모든 기술을 적용하여 상향 링크에서 최대 5.76Mbps를 제공한다. HSPA Evolution(eHSPA 또는 HSPA+)은 HSPA의 성능 개선을 통해 3GPP Release 8 기술인 LTE로의 자연스러운 진화를 보장하기 위한 3GPP Release 7 기술로 2006년 3월 TSG RAN #31 회의에서 승인되었다. 본 고에서는 최근 표준화가 활발히 진행되고 있는 HSPA Evolution에서 최근까지 승인된 각 계층별 요소 기술에 대해 소개하고자 한다.

Joint Hierarchical Modulation and Network Coding for Asymmetric Data Rate Transmission over Multiple-Access Relay Channel (다중 접속 릴레이 채널에서 비대칭 데이터 전송을 위한 계층 변조 및 네트워크 코딩 결합 기법)

  • You, Dongho;Kim, Dong Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.747-749
    • /
    • 2016
  • We consider a time-division multiple-access relay channel (MARC), in which two source nodes (SNs) transmit data with different data rate to a destination node (DN) with the help of a relay node (RN) using network coding (NC). However, due to its asymmetric data rate, the RN cannot combine the received bits by XOR NC. In this paper, we compare with the problem of asymmetric data rates by using zero padding and hierarchical 16QAM.

Fountain Code-based Mobile IPTV System over WiMAX Network (WiMAX 망에서 파운틴 코드 기반의 모바일 IPTV 시스템)

  • Joo, Hyun-Chul;Kim, Wan;Song, Hwang-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.184-186
    • /
    • 2012
  • 본 논문은 WiMAX 망에서 파운틴 인코딩 IPTV 멀티캐스트 스트림을 기지국 내 사용자들에게 원활하게 전송하기 위한 모바일 IPTV 시스템을 제안한다. 제안하는 시스템은 한정된 무선 자원을 효율적으로 사용하면서 기지국 내 모든 사용자들에게 안정적인 IPTV 서비스 제공을 목적으로 한다. 이를 위해 기지국은 사용자들의 링크 상태를 기반으로 파운틴 인코딩 IPTV 멀티캐스트 스트림에 대한 전송 패킷 수와 물리 계층 상의 변조 기법 및 부호화 율을 결정한다.