• Title/Summary/Keyword: 재변조

Search Result 145, Processing Time 0.052 seconds

Improvement of Received Optical Power Sensitivity in Asymmetric 2.5Gbps/1.2Gbps Passive Optical Network with Inverse Return to Zero(RZ) coded Downstream and NRZ upstream re-modulation (역 RZ 부호로 코딩된 하향신호의 재변조를 이용한 비대칭 2.5Gbps/622Mbps 수동 광가입자 망에서의 수신 감도의 개선)

  • Park, Sang-Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.65-72
    • /
    • 2010
  • We propose the asymmetric 2.5Gbps/622Mbps PON(Passive Optical Network) in order to reduce the bandwith of filter at receiver with inverse RZ(Return to Zero) code coded downstream and NRZ(Non Return to Zero) upstream re-modulation. I theoretically analyze BER(Bit Error Rate) performance and the power sensitivity with the optimal threshold level by performing simulation with MATLAB according to the types of downstream data. The results have shown that the optimal threshold level at the optical receiver could be saturated at 0.33 as the optical received power increase more than -26dBm to keep $10^{-12}$ of BER to a minimum. Also the power sensitivity is more improved by about 3dB by fixing the threshold level at 0.33 than the conventional receiver. The proposed system can be a useful technology for optical access networks with asymmetric upstream and downstream data rates because the optical receiver can be used without controlling threshold levels and that does not require a light source in optical network unit (ONU) and its control circuits in the optical line termination (OLT).

A Hybrid ARQ Scheme with Changing the Modulation Order (변조 차수 변경을 통한 하이브리드 자동 재전송 기법)

  • Park, Bum-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.336-341
    • /
    • 2014
  • When using a higher-order modulation scheme, there are variations in bit-reliability depending on the bit position in a modulation symbol. Variations of bit-reliability in the codeword block lower the decoding performance. Also, the decoding performance increases as the sum of the bit-reliabilities in the codeword block increases. This paper presents a novel hybrid automatic repeat request scheme that increases the sum of the reliabilities of the transmitted bits by lowering the modulation order, and decreases the variations of bit-reliability in the codeword block by preferentially retransmitting bits with low reliability. The proposed scheme outperforms the constellation rearrangement scheme. Furthermore, the proposed scheme also provides a good solution in cases where the size of the retransmission block is smaller than the size of the initial transmission block.

Comparison of Korean Speech De-identification Performance of Speech De-identification Model and Broadcast Voice Modulation (음성 비식별화 모델과 방송 음성 변조의 한국어 음성 비식별화 성능 비교)

  • Seung Min Kim;Dae Eol Park;Dae Seon Choi
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.56-65
    • /
    • 2023
  • In broadcasts such as news and coverage programs, voice is modulated to protect the identity of the informant. Adjusting the pitch is commonly used voice modulation method, which allows easy voice restoration to the original voice by adjusting the pitch. Therefore, since broadcast voice modulation methods cannot properly protect the identity of the speaker and are vulnerable to security, a new voice modulation method is needed to replace them. In this paper, using the Lightweight speech de-identification model as the evaluation target model, we compare speech de-identification performance with broadcast voice modulation method using pitch modulation. Among the six modulation methods in the Lightweight speech de-identification model, we experimented on the de-identification performance of Korean speech as a human test and EER(Equal Error Rate) test compared with broadcast voice modulation using three modulation methods: McAdams, Resampling, and Vocal Tract Length Normalization(VTLN). Experimental results show VTLN modulation methods performed higher de-identification performance in both human tests and EER tests. As a result, the modulation methods of the Lightweight model for Korean speech has sufficient de-identification performance and will be able to replace the security-weak broadcast voice modulation.

Serially Concatenated Multilevel Coded Modulation (직렬연접 다중레벨 부호변조)

  • Bae, Sang-Jae;Lee, Sang-Hoon;Joo Eon-Kyeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.11
    • /
    • pp.12-20
    • /
    • 2002
  • Serially concatenated multilevel coded modulation (SCMCM) is proposed in this paper. It is a combined scheme of the outer convolutional code and inner multilevel coded modulation (MCM) which is bandwidth-efficient coded modulation. And the performance of three schemes for decoding of the proposed SCMCM is compared and analyzed. As results of simulations, global iterative decoding with inner and outer code should be performed to improve the error performance as the number of iterations is increased. And the scheme which uses both local iterative multistage decoding in MCM and global iterative decoding with inner and outer code, called Scheme 3 in this paper, shows the best error performance among the three schemes considered in this paper. In addition, performance difference between this scheme and the others is increased as the signal to noise ratio (SNR) is increased. Therefore, Scheme 3 is considered to be the proper decoding scheme of SCMCM.

The Vulnerability Evaluation of Matching Algorithm and Minutiae Detection for Fingerprint Recognition (지문 인식을 위한 특징점 추출 및 매칭 알고리즘 취약성 평가)

  • 최진호;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.206-209
    • /
    • 2003
  • 생체인식 기술 중에서 지문-기반 인식은 많은 어플리케이션에 성공적으로 이용되어온 가장 오래된 방법이지만 지문 인식 시스템이 클라이언트/서버 형식으로 운영될 경우 지문 이미지를 획득하여 특징점을 추출하고 이를 서버로 전송하는 경우 보안 취약성이 존재한다. 취약성에는 여러 가지가 있을 수 있지만 본 연구와 관련된 부분은 지문 이미지 획득과 특징점 추출과정 그리고 추출된 특징점의 매칭 과정에 초점을 맞추고 있다. 본 논문에서는 지문 이미지의 영상 처리를 통한 특징점 추출 및 추출된 특징점을 변조하는 도구를 구현하여 기존의 지문인식 시스템들에 대한 매칭 알고리즘 취약성 평가를 검증할 수 있는 평가 도구를 설계 및 구현하였다. 매칭 알고리즘 취약성 평가는 평가를 위해 구현된 지문 인식 시스템에서 특징점을 추출하고, 추출된 특징점 중 단점을 이용하여 선택된 이미지 영역을 변조한다. 변조된 이미지는 평가 대상 시스템에서 재입력하여 평가를 수행한다.

  • PDF

The Implementation of Integrity Verification Tool for Fingerprint Recognition Systems (지문인식시스템 무결성 검증 도구 구현)

  • 윤덕현;김기욱;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.941-946
    • /
    • 2002
  • 지문인식 시스템이 네트워크 기반에서 서버 매칭 형식으로 운영될 경우 클라이언트 매칭과는 달리 데이터의 전송과정에 많은 취약성이 존재한다. 지문인식은 휴대의 불편함이 없고, 분실이나 도난의 위험성도 없으며, 추측이 거의 불가능하므로 높은 안전성을 제공하는 장점을 가지고 있다. 그러나 지문데이터는 한 번 도난을 당하거나 네트워크 상에서 전송 도중 공격자를 통해 도청이 된다면 그 사용자는 앞으로 지문인식을 이용할 수 없다는 단점이 존재한다. 이에 대하여 전송 포맷 기술과 전송 데이터 보안의 표준화가 이루어지고 있다. 따라서 본 논문에서는 클라이언트에서 추출한 지문 특징점 데이터를 매칭을 위해 서버로 데이터를 전송할 경우 무결성의 적합성을 검증하기 위한 도구를 구현하였다. 신분위장 및 재전송 공격들의 위협으로부터 안전한 사용자 신분 확인을 보장하기 위해서 전송되는 지문 데이터의 인중, 무결성, 기밀성이 요구되며, 이를 위해 지문 데이터의 MAC(Message Authentication Code)과 암호화 기법을 이용하였다. 이때 전송 데이터의 기밀성을 위해서 Triple-DES와 SEED 암호 알고리즘을 사용하였고 무결성을 위해 MD5와 SHA-1 해쉬 함수를 사용하였다. 클라이언트에서 데이터를 전송할 때 두 가지의 지문데이터를 전송하는 실험을 통하여 결과를 비교하였다. 첫째, 변조된 지문데이터를 전송하였을 경우 데이터가 변조되었음을 알려주는 결과를 보여준다. 둘째, 변조되지 않은 지문데이터를 전송하였을 경우 이 데이터는 변조되었다는 메시지를 출력함으로써 무결성 검증 실험은 이루어진다.

  • PDF

LED Automotive Signal Lamp Design (LED를 이용한 차량용 램프 구현)

  • Hong, Dae-Un;Lee, Seong-Jae
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2004.02a
    • /
    • pp.266-267
    • /
    • 2004
  • LED를 이용한 차량용 signal lamp를 구현 하였다. 가변적인 전원전압 및 온도조건에서도 일정한 광량을 유지할 수 있도록 하였으며, 한편 단위 LED 사이의 특성 차이로 인한 밝기의 불균일성을 줄일 수 있도록 하기 위하여 펄스폭 변조를 응용한 회로를 적용하였다.

  • PDF

Channel State-Aware Joint Dynamic Cell Coordination Scheme using Adaptive Modulation and Variable Reuse Factor in OFDMA (OFDMA 하향링크에서 적응적 변조와 여러 개의 재사용 지수를 동시에 사용하고 채널 상태를 고려한 동적 셀 코디네이션)

  • Byun, Dae-Wook;Ki, Young-Min;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1A
    • /
    • pp.24-33
    • /
    • 2007
  • In this paper, two different dynamic cell coordination strategies for frequency flat and selective fading are proposed for efficient subcarrier allocation in the joint consideration of adaptive modulation and variable frequency reuse in the channel-aware OFDMA downlink multicellular environment. Compared to a conventional OFDMA system without cell coordination, where system throughput may become degraded due to the persistent interference from other cells, the proposed system dynamically allows RNC to apply different reuse factors on each subchannel and scheduling in consideration of channel and interference conditions of individual users so as to increase the system throughput and guarantee QoS of each user. In a frequency flat fading, the dynamic scheme with the proposed scheduling achieves on average three times larger throughput than the conventional dynamic scheme [8]. In a selective fading channel, the proposed schemes showed 2.6 times as large throughput as that of a single reuse factor of one for all subchannels.

Performance Analysis for Selection Decode-and-Forward Relay Networks with Differential Modulation over Rayleigh Fading Channels (레일리 페이딩 채널에서 차등 변조기법을 이용한 선택적 복호 후 재전송 중계 네트워크의 성능 분석)

  • Kong, Hyung-Yun;Bao, Vo Nguyen Quoc
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.1-9
    • /
    • 2010
  • This paper offers performance analysis of selection decode and forward (DF) networks with differential modulation/demodulation for an arbitrary number of relays in independent but not identically distributed Rayleigh fading channels. We have shown that the selection DF protocol with differential modulation can achieve full diversity in both independent identically distributed (i.i.d.) and independent but not identically distributed (i.n.d.) Rayleigh fading channels, and the performance loss due to using non-coherent detection is not substantial. Furthermore, we study the impact of combining techniques on the performance of the system by comparing a system that uses selection combining (SC) to one that uses maximum ratio combining (MRC). Simulations are performed and show that they match exactly with analytic ones in high SNR regime.