• Title/Summary/Keyword: 복호 후 전송

Search Result 112, Processing Time 0.023 seconds

Efficient Decoder Model of FTN Signal for (1+7) PSK Modulation based on DVB-S3 (DVB-S3기반 (1+7)PSK 변조방식에서 FTN 신호의 효율적인 복호 모델)

  • Baek, Chang-Uk;Jung, Ji-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.55-61
    • /
    • 2017
  • In DVB-S3 standard of satellite broadcasting systems, FTN technique is applied to LDPC codes with (1+7) PSK modulation. In standard, BICM-ID and BCJR decoding method are considered to alleviate performance degradation due to FTN processing. BICM-ID method improves performance by calculating a new LLR from hard-decision value of decoder output. BCJR also improves performance by calculating forward and backward matrix each other. However these two methods require high computational complexity. Therefore this paper proposed modified decoding method in order to reduce computational complexity without performance degradation.

System Optimization, Full Data Rate and Transmission Power of Decode-and-Forward Cooperative Communication in WSN (WSN환경에서 Decode-and-Forward 협력통신의 시스템 최적화 및 최대전송률과 저전력에 관한 연구)

  • Kim, Gun-Seok;Kong, Hyung-Yun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.597-602
    • /
    • 2007
  • In conventional cooperative communication data rate is 1/2 than non cooperative protocols. In this paper, we propose a full data rate DF (Decode and Forward) cooperative transmission scheme. Proposed scheme is based on time division multiplexing (TDM) channel access. When DF protocol has full data rate, it can not obtain diversity gain under the pairwise error probability (PEP) view point. If it increases time slot to obtain diversity gain, then data rate is reduced. The proposed algorithm uses orthogonal frequency and constellation rotation to obtain both full data rate and diversity order 2. Moreover, performance is analyzed according to distance and optimized components that affect the system performance by using computer simulation. The simulation results revealed that the cooperation can save the network power up to 7dB over direct transmission and 5dB over multi-hop transmission at BER of $10^{-2}$. Besides, it can improve date rate of system compared with the conventional DF protocol.

Video Conference System Construction that Apply Real Time Video Encryption Techniques (실시간 동영상 암호화 기법을 적용한 화상회의 시스템 구축)

  • 최우진;김형균;오무송
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.931-936
    • /
    • 2002
  • By emphasize and enhance security in encryption of same viewdata in this research, constructed video conference system that apply real time video encryption techniques that confidentiality and integrity aspect are emphasized than video conference system that depend on existent user certification techniques. Sender's image transmits Vernam's encryption process to listener by packet. Listener can display image through image's decipher process and uncompress after unite receiving transmited image. This time, solved transmission speed delay problem by video's real time encryption using Vernam's algorithm that encryption and the decipher speed are fast. Simplification problem of Vernam algorithm wished to solve Session Key that use security Key that is used encipherment and decipher in channel between Client and Server using RSA algorithm.

A Novel Cooperative Communication to Achieve Secondary Spectrum Access Using Adaptive Incremental Decode-and-Forward(AIDF) Protocol (적응 증분 복호 후 전달 프로토콜을 이용하여 2차 스펙트럼 접근이 가능한 협력 통신 기법)

  • Kim, Lyum;Kong, Hyung-Yun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.354-361
    • /
    • 2011
  • In this paper, we propose a spectrum sharing system that enable secondary user's spectrum access in cooperative communication scheme. At phase 1, a transmitter in primary system broadcasts signals to the rest nodes. And then, at phase 2, a transmitter in secondary system combines the decoded signals after received from a transmitter in primary system and its own signal. And then transmitter of secondary system broadcasts the combined signals to receivers of primary and secondary systems. At this time, due to the process of combining signals, receivers of primary and secondary systems experiences a performance degradation. Therefore, we propose a novel adaptive incremental decode-andforward(AIDF) protocol to overcome this problem. By using AIDF protocol, we show performance improvement of total system through various simulations.

BER Performance Analysis for Adaptive Cooperation Scheme with Decode-and-Forward Relay-Selection (복호 후 전달 릴레이 선택을 이용한 적응형 협력 기법의 BER 성능분석)

  • Vu, Ha Nguyen;Kong, Hyung-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.831-843
    • /
    • 2009
  • In this paper, we propose a new adaptive cooperation scheme with multi-relay nodes which achieves higher performance and spectral efficiency than that of some conventional cooperative schemes. The relay-selection is applied to choose the most potential relay among K ones. Afterward, the instantaneous signal-to-noise ratio (SNR) differences between S-D, S-R and R-D channels are considered for adaptive selection between the direct and the cooperation transmission strategy. In the proposed adaptive protocol, if the direct link is of high quality, the source will transmit to destination directly with all power consumption. Otherwise, the source broadcasts the signal with a lower power and requires the help of the chosen relay if it decodes correctly, else the source will transmit again with remaining power. Firstly, the spectral efficiency is derived by calculating the probability of each mode. Subsequently, the BER performance for the adaptive cooperation scheme is analyzed by considering each event that one of K relays is selected and then making the summation of all. Finally, the numerical results are presented to confirm the performance enhancement offered by the proposed schemes.

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

Performance Analysis of Adaptive Cooperation Scheme with Decode-and-Forward (적응형 복호 후 전달 협력 통신의 성능 분석)

  • Vu, Ha Nguyen;Kong, Hyung-Yun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.82-88
    • /
    • 2009
  • An adaptive cooperation system is considered with the cooperation decision strategy based on the differences between instantaneous signal-to-noise ratio (SNR) S-D and R-D channels. Specifically, if the quality of the direct link (S-D) is better than that of the link from the relay to the destination (R-D), the source will transmit to destination directly with all scheme's transmitted power. Otherwise, the source broadcasts the signal with a lower power in the first time slot. Then, in the second time slot, if the relay decodes its received signal correctly, it re-transmits the re-encoded signal to the destination else the source will transmit again with the remaining power. Firstly, the spectral efficiency is derived by calculating the probabilities of direct transmission and cooperation mode. Subsequently, the BER performance for the adaptive cooperation schemes is analyzed by considering the BER routine of each mode. Finally, the Monte-Carlo simulation results are presented to confirm the performance enhancement offered by the proposed schemes.

A Decoder Design for High-Speed RS code (RS 코드를 이용한 복호기 설계)

  • 박화세;김은원
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.1
    • /
    • pp.59-66
    • /
    • 1998
  • In this paper, the high-speed decoder for RS(Reed-Solomon) code, one of the most popular error correcting code, is implemented using VHDL. This RS decoder is designed in transform domain instead of most time domain. Because of the simplicity in structure, transform decoder can be easily realized VLSI chip. Additionally the pipeline architecture, which is similar to a systolic array is applied for all design. Therefore, This transform RS decoder is suitable for high-rate data transfer. After synthesis with FPGA technology, the decoding rate is more 43 Mbytes/s and the area is 1853 LCs(Logic Cells). To compare with other product with pipeline architecture, this result is admirable. Error correcting ability and pipeline performance is certified by computer simulation.

  • PDF

Telecommand Decryption Verification for Engineering Qualification Model of Command Telemetry Unit in Communications Satellite (통신위성 원격측정명령처리기 성능검증모델 원격명령 암호복호 검증)

  • Kim, Joong-Pyo;Koo, Cheol-Hea
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.7
    • /
    • pp.98-105
    • /
    • 2005
  • In this paper, the decryption function of CCSDS telecommand of CTU EQM for the security of communications satellite was verified. In order to intensify the security level of DES CFB decryption algorithm applied to CTU EM, 3DES CFB decryption algorithm using three keys is implemented in the CTU EQM. As the decryption keys increased due to the 3DES algorithm, the keys and IV are stored in PROM memory, and used for the telecommand decryption by taking the keys and IVs corresponding to the selected key and IV indexes from the memory. The operation of the 3DES CFB is validated through the timing simulation of 3DES CFB algorithm, and then the 3DES CFB core implemented on the A54SX32 FPGA. The test environment for the telecommand decryption verification of the CTU EQM was built up. Through sending and decrypting the encrypted command, monitoring the opcodes, and confirming LED on/off by executing the opcodes, the 3DES CFB telecommand decryption function of the CTU EQM is verified.

A Study on An Error-Resilient Constant Bit Rate Video Codec (에러 환경에 강한 항등비트율 동영상 부호화기에 관한 연구)

  • 한동원;송진규;김용구;최윤식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1721-1730
    • /
    • 1999
  • In this thesis, an error resilient video coding algorithm, under the error-prone environment such as wireless communication, is suggested. The suggested algorithm adapts the Classified VQ method for intra imagers that reduces some load by searching similar vectors. The Duplicate Vector Position Code is proposed for the higher compression efficiency and the robust decoding in error environment. As a result, the bitstream encoded by the proposed method is in a CBR(Constant Bit Rate) preventing from error propagation. The experiment that adds practical error to the encoded bitsrteam shows the error-robustness superior to H.263.

  • PDF