• Title/Summary/Keyword: 양의 부호

Search Result 151, Processing Time 0.029 seconds

Performance Analysis of Cooperative Network Error Correcting Scheme Using Distributed Turbo Code and Power Allocation (양방향 중계 채널에서 네트워크 코딩을 이용한 분산 터보 부호 기법과 전력 할당의 성능 분석)

  • Lim, Jin-Soo;Ok, Jun-Ho;Yoo, Chul-Hae;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.57-64
    • /
    • 2011
  • A two-way relay channel is a bidirectional cooperative communication channel between two nodes using a relay. In many cooperative communication schemes, a relay transmits its data to each node using separate channels. However, in the two-way relay channel, a relay can broadcast the network-coded signal to both nodes in a same time slot, which can increase the system throughput. In this paper, a new cooperative network error correcting scheme using distributed turbo code in a two-way relay channel is proposed. The proposed scheme not only increases the system throughput using network code but also improves the performance by utilizing the LLR information from relay node and other user node through distributed turbo code. Also, a power allocation scheme is investigated for various channel conditions to improve the system performance.

A Simple Stopping Criterion for the MIN-SUM Iterative Decoding Algorithm on SCCC and Turbo code (반복 복호의 계산량 감소를 위한 간단한 복호 중단 판정 알고리즘)

  • Heo, Jun;Chung, Kyu-Hyuk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.4
    • /
    • pp.11-16
    • /
    • 2004
  • A simple stopping criterion for iterative decoding based on min-sum processing is presented. While most stopping criteria suggested in the literature, are based on Cross Entropy (CE) and its simplification, the proposed stopping criterion is to check if a decoded sequence is a valid codeword along the encoder trellis structure. This new stopping criterion requires less computational complexity and saves mem4)ry compared to the conventional stopping rules. The numerical results are presented on the 3GPP turbo code and a Serially Concatenated Convolutional Cods (SCCC).

Performance Evaluation of Secure Embedded Processor using FEC-Based Instruction-Level Correlation Technique (오류정정 부호 기반 명령어 연관성 기법을 적용한 임베디드 보안 프로세서의 성능평가)

  • Lee, Seung-Wook;Kwon, Soon-Gyu;Kim, Jong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.526-531
    • /
    • 2009
  • In this paper, we propose new novel technique (ILCT: Instruction-Level Correlation Technique) which can detect tempered instructions by software attacks or hardware attacks before their execution. In conventional works, due to both high complex computation of cipher process and low processing speed of cipher modules, existing secure processor architecture applying cipher technique can cause serious performance degradation. While, the secure processor architecture applying ILCT with FEC does not incur excessive performance decrease by complexity of computation and speed of tampering detection modules. According to experimental results, total memory overhead including parity are increased in average of 26.62%. Also, secure programs incur CPI degradation in average of $1.20%{\sim}1.97%$.

Fuzzy Quantization and Rate Control for Very Low Bit­rate Video Coder (초저전송율 동영상 부호기를 위한 퍼지 양자화 및 율 제어에 관한 연구)

  • 양근호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1684-1690
    • /
    • 2003
  • In this paper, we proposed a fuzzy controller for the evaluation of the quantization Parameters in the H.263 coder to optimize the subjective quality of each coded frame, keeping the transmission rate constant. We adopted the Mamdani method for fuzzification and the centroid method for defuzzification. The energy and entropy are correlated to features of the HVS in spatial domain, while motion vectors are used to estimate the temporal characteristics of the signal. And then, the fuzzy inputs adapted the variance and the entropy in spatial domain, and the motion vector in temporal domain. We induced the fuzzy membership function and decided the fuzzy relevance to be compatible in visual characteristics. And then, we designed FAM banks. The fuzzy technology has been applied to a practical video compression. This results is obtained an effective rate control technique, an optimum bit allocation and a high subjective quality using fuzzy quantization.

Rate Control of Very Low Bit-Rate Video Coder using Fuzzy Quantization (퍼지 양자화를 이용한 초저전송률 동영상 부호기의 율제어)

  • 양근호
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.2
    • /
    • pp.91-95
    • /
    • 2004
  • In this paper, we propose a fuzzy controller for the evaluation of the quantization parameters in the H.263 coder. Our method adopts the Mamdani method for fuzzification and adopts the centroid method for defuzzification respectively. The inputs are variance, entropy in the spatial domain, current motion vector and previous motion vector in the temporal. Fuzzy variables are determined to be compatible in visual characteristics and fuzzy membership function is induced and then, FAM banks are designed to reduce the number of rules. In this paper, fuzzy quantization has been applied to a practical video compression. This results show that the quality of decode image enhances and the rate control method using fuzzy quantization is effective.

  • PDF

3DTV 방송 서비스를 위한 MPEG-2 와 HEVC 기반의 하이브리드 양안식 비디오 부호화 방법

  • Na, Tae-Yeong;Kim, Mun-Cheol;Kim, Byeong-Seon;Ham, Sang-Jin;Lee, Geun-Sik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.365-367
    • /
    • 2012
  • 하이브리드 양안식 비디오 부호화 방식은 한정된 대역폭 내에서 MPEG-2 기반의 기존 2D 디지털 방송서비스를 지원하면서, 동시에 추가적인 시점 영상을 MPEG-2 가 아닌 비디오 부호화 표준을 사용함으로써 3DTV 방송 서비스를 가능하게 한다. 본 논문에서는 기존의 2D 디지털 방송 서비스를 위한 좌안 영상은 MPEG-2 로 부호화되어 지상파로 전송되고, 3DTV 방송에 필요한 우안 영상은 HEVC 로 부호화되어 인터넷으로 전송되는 방송 상황을 가정한다. 또한 MPEG-2 로의 좌안 영상 부호화 시의 파생 정보를 활용하여 HEVC 로의 우안 영상 부호화 시의 성능 향상을 도모한다. 이를 위해 우선 기존 HEVC 를 움직임 벡터에 기반한 예측 부호화뿐 아니라 변이 벡터에 기반한 시차간 예측 부호화가 가능한 구조로 확장한 후, 움직임 벡터 부호화를 위해 HEVC 에 포함된 AMVP 기술을 변이 벡터가 사용됨에 따라 발생할 수 있는 여러 상황을 고려하여 확장한다. 실험결과 제안하는 하이브리드 양안식 부호화기로 우안 영상을 부호화할 경우에, 단독으로 HEVC 를 사용하여 우안 영상을 부호화하는 경우와 비교하여 BDBR 측면에서 평균 34.49%의 성능 향상을 관찰할 수 있었다.

  • PDF

Estimation of BDI Volatility: Leverage GARCH Models (BDI의 변동성 추정: 레버리지 GARCH 모형을 중심으로)

  • Mo, Soo-Won;Lee, Kwang-Bae
    • Journal of Korea Port Economic Association
    • /
    • v.30 no.3
    • /
    • pp.1-14
    • /
    • 2014
  • This paper aims at measuring how new information is incorporated into volatility estimates. Various GARCH models are compared and estimated with daily BDI(Baltic Dry Index) data. While most researchers agree that volatility is predictable, they differ on how this volatility predictability should be modelled. This study, hence, introduces the asymmetric or leverage volatility models, in which good news and bad news have different predictability for future. We provide the systematic comparison of volatility models focusing on the asymmetric effect of news on volatility. Specifically, three diagnostic tests are provided: the sign bias test, the negative size bias test, and the positive size bias test. From the Ljung-Box test statistic for twelfth-order serial correlation for the level we do not find any significant serial correlation in the unpredictable BDI. The coefficients of skewness and kurtosis both indicate that the unpredictable BDI has a distribution which is skewed to the left and significantly flat tailed. Furthermore, the Ljung-Box test statistic for twelfth-order serial correlations in the squares strongly suggests the presence of time-varying volatility. The sign bias test, the negative size bias test, and the positive size bias test strongly indicate that large positive(negative) BDI shocks cause more volatility than small ones. This paper, also, shows that three leverage models have problems in capturing the correct impact of news on volatility and that negative shocks do not cause higher volatility than positive shocks. Specifically, the GARCH model successfully reveals the shape of the news impact curve and is a useful approach to modeling conditional heteroscedasticity of daily BDI.

Thermodynamics of the Micellization of Cetylpyridinium Bromide in Some Aqueous Alcohol Solutions (몇 가지 알코올-수용액에서 Cetylpyridinium Bromide의 미셀화의 열역학적 성질)

  • Chung Jong-Jae;Lee Sang-Wook;Choi Joon-Ho
    • Journal of the Korean Chemical Society
    • /
    • v.37 no.1
    • /
    • pp.49-54
    • /
    • 1993
  • The effects of added alcohols on the critical micelle concentration(CMC) of cetylpyridinium bromide(CPB) were investigated by the UV-Vis spectrophotometer at the temperature range of 8∼45$^{\circ}C$. The CMC of CPB was increased with the addition of methanol in the whole temperature region studied, while decreased with the addition of ethanol and propanol. The increase of CMC with the addition of methanol may be attributable to the increasing solvent power of the methanol-water mixture, because methanol was scarcely solubilized into the palisade layer of the micelle of CPB. The decrease of CMC with the inclusion of ethanol and propanol may be derived from the solubilization of alcohols into the micelles. On the other hand, the CMC was decreased with the temperature rise in the low-temperature region below about 25$^{\circ}C$, and the CMC was increased in the high-temperature region above that. The thermodynamic parameters (${\Delta}G_M^{\circ},\;{\Delta}H_M^{\circ},\;and\;{\Delta}S_M^{\circ}$) of the micellization of CPB were obtained in some aqueous alcohol solutions. In the whole temperature region (8∼45$^{\circ}C$), the values of ${\Delta}G_M^{\circ}$ were negative, while those of ${\Delta}S_M^{\circ}$ were positive. And in the temperature region below about 25$^{\circ}C$ the ${\Delta}H_M^{\circ}$ values were positive, while in the temperature region above that the values were negative.

  • PDF

An Study on Long Run Effects of Determinants on Export of Korean Goods to US (한국의 대미국 수출 결정요인의 장기적 영향에 관한 연구)

  • Choi, Mun Seong
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.409-433
    • /
    • 2014
  • In this paper, I estimate long-run elasticities of US real GDP and real exchange rate between Korean Won and US Dollar on export of Korean goods to US and analyze changes in their trend by using VECM and rolling regression with a fixed window. For the purposes I use the year data from 1990 to 2013 which are selected from UNCTAD, Korea Trade Association(KTA), and Bank of Korea(BOK). The results are that the long-run elasticities of US real GDP vary from 2.849 to 2.938 for the period from 1990 to 2013 depending on the models in VECM and all of them are significant statistically. The elasticities of real exchange rate between Korean WON and US Dollar vary from 0.962 to 0.967 for the same period depending on the models in VECM and all of them are significant statistically. In case of the results through the OLS and the rolling regression, the long-run elasticities of US. real GDP are 3.015 for Basic Model, 2.949 for the modified Model 1, and 2.125 for the modified Model 2 for the period from 1990 to 2013 depending on the models and all of them are significant statistically. The average of long-run elasticities of real US GDP before the global financial crisis of 2008 is greater than that after the global financial crisis of 2008. On the other hand, the long-run elasticities of real exchange rate between Korean WON and US $ are 0.347 for Basic Model, 0.566 for the modified Model 1, and -0.217 for the modified Model 2 for the same period and all of them are significant statistically except for the modified Model 2. The average of long-run elasticities of real exchange rate before the global financial crisis of 2008 is greater than that after the global financial crisis of 2008.

  • PDF

SPA-Resistant Unsigned Left-to-Right Receding Method (SPA에 안전한 Unsigned Left-to-Right 리코딩 방법)

  • Kim, Sung-Kyoung;Kim, Ho-Won;Chung, Kyo-Il;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.21-32
    • /
    • 2007
  • Vuillaume-Okeya presented unsigned receding methods for protecting modular exponentiations against side channel attacks, which are suitable for tamper-resistant implementations of RSA or DSA which does not benefit from cheap inversions. The proposed method was using a signed representation with digits set ${1,2,{\cdots},2^{\omega}-1}$, where 0 is absent. This receding method was designed to be computed only from the right-to-left, i.e., it is necessary to finish the receding and to store the receded string before starting the left-to-right evaluation stage. This paper describes new receding methods for producing SPA-resistant unsigned representations which are scanned from left to right contrary to the previous ones. Our contributions are as follows; (1) SPA-resistant unsigned left-to-right receding with general width-${\omega}$, (2) special case when ${\omega}=1$, i.e., unsigned binary representation using the digit set {1,2}, (3) SPA-resistant unsigned left-to-right Comb receding, (4) extension to unsigned radix-${\gamma}$ left-to-right receding secure against SPA. Hence, these left-to-right methods are suitable for implementing on memory limited devices such as smartcards and sensor nodes