• Title/Summary/Keyword: 역 필터

Search Result 494, Processing Time 0.021 seconds

Single chip multi-function peripheral image processor with unified binarization architecture (통합된 이진화 구조를 가진 복합기용 1-Chip 영상처리 프로세서의 개발)

  • Park, Chang-Dae;Lee, Eul-Hwan;Kim, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.34-43
    • /
    • 1999
  • A high-speed image processor (HIP) is implemented for a high-speed multi-function peripheral. HIP has a binarization architecture with unified data path. It has the pixel-by-pixel pipelined processing to minimize size of the external memory. It performs pre-processing such as shading correction, automatic gain control (AGC), and gamma correction, and also drives external CCD or CIS modules. The pre-processed data can be enlarged or reduced. Various binarizatin algorithms can be processed in the unified archiecture. The embedded binarization algorithms are simple thresholding, high pass filtering, dithering, error diffusion, and thershold modulated error diffusion. These binarization algorithms are unified based on th threshold modulated error diffusion. The data path is designed to share the common functional block of the binarization algorithms. The complexity of the controls and the gate counts is greatly reduced with this novel architecture.

  • PDF

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Structural vibration control using $H_{\infty}$ control theory : unceratinty model ($H_{\infty}$제어이론을 이용한 구조진동제어 - 불확실성 모델)

  • 송병석
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1995.04a
    • /
    • pp.240-245
    • /
    • 1995
  • 제어이론의 역사적 발전사를 고찰해보면 1930년대부터 1960년대까지를 고전 제어(classical control) 시대로 분류되고 이때 주로 사용되었던 용어들은 주파수역(frequency domain)에서 사용된 개념인 극점(pole), 영점(zero), Nyquist, 근궤적(root-Locus) 선도(plot)등으로 대표된다. 그 다음단계인 현대 제어(modern control) 시대 (1960년대-1980년대)때는 새로운 개념들이 도입 되었는데 시간역(time domain)에서 사용되는 상태공간(state-space) 모델, 가제어성(controllability), 가관측성(observability), Kalman 필터, LQG 제어 등이다. 1980년대부터 현재까지를 강인제어(robust control) 시대로 분류하는데 이것의 특징들은 극점이나 영점 대신 상태공간 모델을 사용하여 주파수역에서 정의되는 개념들인 H$_{\infty}$ 합성법, .$\mu$ 해석법, LQG/LTR 및 QFT, Lyapunov 등으로 대표된다. 현대제어시대때는 제어기 K는 공칭 플랜트 모델 G$_{0}$를 기준으로 설계되었으나 실제로 공칭 플랜트 모델은 실제 플랜트와 항상 같을 수가 없었다. 따라서 실제 플랜트 G는 G=G$_{0}$ + .DELTA.G로 표현되며 여기서 .DELTA.G는 플랜트 불 확실성(plant uncertainty), 즉 실제 플랜트와 공칭 플랜트의 차이를 나타낸 다. 이 플랜트 불확실성은 제어기가 실제 응용되어 사용되었을 때 제대로 작동하지 않는 주요 이유중에 하나이다. 이와 같은 상황에서 안정도 강인성 (stability robustness) 및 성능 강인성(performance rosubtness)의 보장은 상 당히 중요한 문제로 대두되었으며 주어진 플랜트 불확실성하에서 이러한 강이성들이 보장되는 제어이론들 중 H$_{\infty}$ 제어이론이 많이 연구/응용 되고 있다. 특히 공칭 플랜트 모델과 함께 사용되는 플랜트 모델과 함께 사용되는 플랜트 불확실성 모델은 직접적으로 성능 및 안정도에 영향을 미치므로 주의 깊게 선정해야 한다.

  • PDF

A Study on the Performance Improvement with Subband Overlapping Variation for Overlapped Multicarrier DS-CDMA Systems (중복된 멀티캐리어 DS-CDMA 시스템의 서브밴드 중복율 변화에 따른 성능개선에 관한 연구)

  • O, Jeong-Heon;Park, Gwang-Cheol;Kim, Gi-Du
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.9
    • /
    • pp.11-23
    • /
    • 2000
  • Multicarrier DS-CDMA is an effective approach to realize wideband CDMA system in a multipath fading channel. In this paper, we propose a convolutionally-coded overlapped multicarrier DS-CDMA system, and analyze the performance with subband overlapping variation to determine the overlapping percentage showing best performance. Given a total number of subcarriers M*R, we will show that the BER variation is highly dependent on the rolloff factor P of raised-cosine chip wave-shaping filter irrespective of convolutional encoding rate I/M and repetition coding rate 1/R. We also analyze the possibility of reduction in total MUI by considering both variation of a rolloff factor (0 ($\beta$ :1) and variation of subband overlapping factor (0 ( A :2), and show that the proposed system may outperform the multicarrier DS-CDMA system in [1, 12].

  • PDF

Design of a Compact and Wide Bandstop Filter using a Multilayered Photonic Bandgap Structure (다층 포토닉 밴드갭 구조를 이용한 소형의 광대역 저지 여파기 설계)

  • Seo, Jae-Ok;Park, Seong-Dae;Kim, Jin-Yang;Lee, Hai-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.11
    • /
    • pp.34-39
    • /
    • 2002
  • In this paper, we proposed novel photonic bandgap(PBG) structure using EGP(Elevated Ground Plane) and via in ceramic substrate of microstrip line. From analysis result, the proposed PBG structure is reduced 52.5% at size and increased 45 % at bandwidth compared to typical planar PBG structure. It is also reduced 32 % at size and improved more than 8 dB at power loss compared to typical multilayer DGS(Defected Ground Structure). The proposed PBG structure also can be used bandstop and lowpass filter and it will be useful for small microwave integrated circuit and module development.

A Research on the FCB Detection Algorithm for the GSM Mobile System (GSM 무선시스템에서 주파수정정 버스트 (FCB) 검출 알고리즘에 관한 연구)

  • 김범진;한재충;홍승억
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1876-1882
    • /
    • 1999
  • In this paper, we have proposed a FCB detection algorithm for the GSM system which is european cellular standard. The detection algorithm can be implemented using received signal sampler, correlator, and post detection combiner. GSM mobile phone can use the proposed algorithm for detection of the Broadcasting Channel, and to obtain the initial timing estimate. The proposed algorithm has a architecture which is suitable for DSP or ASIC implementation, and required memory size is small. The performance of the algorithm is a function of the processing data window size and the threshold values. Proper window size and the threshold values can be determined by analyzing the correlator and combiner. The proposed algorithm has been implemented using DSP, and the performance was verified using baseband simulation. The simulation assumed frequency offset values of 0ppm and 15ppm with the receiver filter bandwidth set at both minimum and maximum. It is shown that the algorithm is robust under various assumptions, and suitable for real implementations.

  • PDF

Design and Comparison of Digital Predistorters for High Power Amplifiers (비선형 고전력 증폭기의 디지털 전치 보상기 설계 및 비교)

  • Lim, Sun-Min;Eun, Chang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.403-413
    • /
    • 2009
  • We compare three predistortion methods to prevent signal distortion and spectral re-growth due to the high PAPR (peak-to-average ratio) of OFDM signal and the non-linearity of high-power amplifiers. The three predistortion methods are pth order inverse, indirect learning architecture and look up table. The pth order inverse and indirect learning architecture methods requires less memory and has a fast convergence because these methods use a polynomial model that has a small number of coefficients. Nevertheless the convergence is fast due to the small number of coefficients and the simple computation that excludes manipulation of complex numbers by separate compensation for the magnitude and phase. The look up table method is easy to implement due to simple computation but has the disadvantage that large memory is required. Computer simulation result reveals that indirect learning architecture shows the best performance though the gain is less than 1 dB at $BER\;=\;10^{-4}$ for 64-QAM. The three predistorters are adaptive to the amplifier aging and environmental changes, and can be selected to the requirements for implementation.

Threshold Selection Method for Capacity Optimization of the Digital Watermark Insertion (디지털 워터마크의 삽입용량 최적화를 위한 임계값 선택방법)

  • Lee, Kang-Seung;Park, Ki-Bum
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.1
    • /
    • pp.49-59
    • /
    • 2009
  • In this paper a watermarking algorithm is proposed to optimize the capacity of the digital watermark insertion in an experimental threshold using the characteristics of human visual system(HVS), adaptive scale factors, and weight functions based on discrete wavelet transform. After the original image is decomposed by a 3-level discrete wavelet transform, the watermarks for capacity optimization are inserted into all subbands except the baseband, by applying the important coefficients from the experimental threshold in the wavelet region. The adaptive scale factors and weight functions based on HVS are considered for the capacity optimization of the digital watermark insertion in order to enhance the robustness and invisibility. The watermarks are consisted of gaussian random sequences and detected by correlation. The experimental results showed that this algorithm can preserve a fine image quality against various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, sharpening, linear and non-linear filtering, etc.

  • PDF

Design and Implementation of Modulator Channel Card and VLSI Chip for a Wideband CDMA Wireless Local Loop System (광대역 CDMA WLL 시스템을 위한 변조기 채널 카드 및 VLSI 칩 설계 및 구현)

  • 이재호;강석봉;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1571-1578
    • /
    • 1999
  • In this paper, we present the Modulator Channel Card and VLSI chip for the Radio Transceiver Unit (RTU) of direct sequence code division multiple access (DS-CDMA) Wireless Local Loop (WLL) System. The Modulator Channel Card is designed and implemented using ASIC's, FPGA's and DSP's. The ASIC, compliance with Common Air Interface specification proposed by ETRI, has 40K gates which is designed to operate at 32MHz, and is fabricated using $0.6\mu\textrm{m}$ CMOS process. The ASIC carries out for I- or Q- phase data channel signal processing at a time, where each data channel processing consists of channel coding, block interleaving, scrambling, Walsh modulation, Pseudo-Noise (PN) spreading, and baseband filtering. The Modulator Channel Card has been integrated as a part of RTU of WLL system and is confirmed that it meets all functional and performance requirements.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF