• Title/Summary/Keyword: 재변조

Search Result 145, Processing Time 0.038 seconds

Long-Term Performance Evaluation of Scheduling Disciplines in OFDMA Multi-Rate Video Multicast Transmission (OFDMA 다중률 비디오 멀티캐스트 전송에서 스케줄링 방식의 장기적 성능 평가)

  • Hong, Jin Pyo;Han, Minkyu
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.246-255
    • /
    • 2016
  • The orthogonal frequency-division multiple access (OFDMA) systems are well suited to multi-rate multicast transmission, as they allow flexible resource allocation across both frequency and time, and provide adaptive modulation and coding schemes. Unlike layered video coding, the multiple description coding (MDC) enables flexible decomposition of the raw video stream into two or more substreams. The quality of the video stream is expected to be roughly proportional to data rate sustained by the receiver. This paper describes a mathematical model of resource allocation and throughput in the multi-rate video multicast for the OFDMA wireless and mobile networks. The impact on mean opinion score (MOS), as a measurement of user-perceived quality (by employing a variety of scheduling disciplines) is discussed in terms of utility maximization and proportional fairness. We propose a pruning algorithm to ensure a minimum video quality even for a subset of users at the resource limitation, and show the optimal number of substreams and their rates can sustain.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

ISAR Imaging Using Rear View Radars of an Automobile (후방 감시 차량용 레이다를 이용한 ISAR 영상 형성)

  • Kang, Byung-Soo;Lee, Hyun-Seok;Lee, Seung-Jae;Kang, Min-Suk;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.2
    • /
    • pp.245-250
    • /
    • 2014
  • This paper introduces the inverse synthetic aperture radar(ISAR) imaging technique for rear view target of an automobile, which uses both linear frequency modulation-frequency shift keying(LFM-FSK) waveform and monopulse tracking. LFM-FSK waveform consists of two sequential stepped frequency waveforms with some frequency offset, and thus, can be used to generate ISAR images of rear view target of an automobile. However, ISAR images can often be blurred due to non-uniform change rate of relative aspect angle between radar and target. In order to address this problem, one-dimensional(1-D) Lagrange interpolation technique in conjunction with angle information obtained from the monopulse tracking is applied to generate uniform data across the radar's aspect angle. Simulation results show that the proposed method can provide focused ISAR images.

2.5 Gbps Hybrid PON link Using RSOA Based WDM-PON and a Reach Extender (RSOA기반 WDM-PON 링크와 Reach Extender를 이용한 2.5 Gbps 하이브리드 PON 링크 기술)

  • Kim, Kwang-Ok;Lee, Jie-Hyun;Lee, Sang-Soo;Jang, Youn-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.583-591
    • /
    • 2011
  • We presents the architecture of the 2.5 Gbps hybrid PON link which can increase of the transmission distance and link capability, and split ratio by using a colorless DWDM-PON and O/E/O based reach extender into an existing G-PON link. A RSOA based DWDM-PON to apply the feeder fiber can provide a link capacity of 32 larger that of a legacy G-PON. The reach extender converts the wavelength of DWDM-PON to G-PON through GTC frame regeneration at the remote node, and can provide a burst reset signal in order to extract upstream burst signal, simultaneously. The proposed hybrid PON enable a legacy G-PON to operate over the maximum 60 km distance with a 128-way split per WDM wavelength.

Digital Signal Processing Techniques for the Equalization Digital On-Channel Repeater in the ATSC Terrestrial DTV System (ATSC 지상파 DTV 시스템의 등화형 디지털 동일 채널 중계기를 위한 디지털 신호 처리 기술)

  • Park Sung Ik;Eum Homin;Lee Yong-Tae;Kim Heung Mook;Seo Jae Hyun;Kim Hyoung-Nam;Kim Seung Won
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.357-370
    • /
    • 2004
  • In this paper we propose Digital Signal Processing (DSP) techniques for the Equalization Digital On-Channel Repeater(EDOCR) in the ATSC digital TV (DTV) System. DSP techniques consist of demodulation. baseband equalization, and remodulation. Since the time delay caused by signal processing in the EDOCR can seriously affect the performance of ATSC legacy receivers, it is required that the processing time should be minimized as much as possible. To achieve this goal, we focus on the reduction of the EDOCR's time delay with the minimization of its performance degradation. In addition, we present recommended proper parameters for hardware implementation based on extensive simulation result.

Design of Log Management System based on Document Database for Big Data Management (빅데이터 관리를 위한 문서형 DB 기반 로그관리 시스템 설계)

  • Ryu, Chang-ju;Han, Myeong-ho;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2629-2636
    • /
    • 2015
  • Recently Big Data management have a rapid increases interest in IT field, much research conducting to solve a problem of real-time processing to Big Data. Lots of resources are required for the ability to store data in real-time over the network but there is the problem of introducing an analyzing system due to aspect of high cost. Need of redesign of the system for low cost and high efficiency had been increasing to solve the problem. In this paper, the document type of database, MongoDB, is used for design a log management system based a document type of database, that is good at big data managing. The suggested log management system is more efficient than other method on log collection and processing, and it is strong on data forgery through the performance evaluation.

Numerical Optimization of NRZ 40Gbps WDM systems (NRZ 방식을 이용한 40Gbps WDM 시스템의 최적화)

  • Lee, Jong-Hyung;Han, Dae-Hyun;Lee, Yong-Jae;Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1860-1865
    • /
    • 2008
  • 40Gbps WDMSystems have been studied by numerical simulation to optimize their performance. Standard single mode fiber is assumed, and the most popular modulation format, NRZ, is used for the study. These assumptions are valid when existing WDM systems are required to upgrade their performance to 40Gbps. It is shown that the standard single mode fiber can transmit optical signals over 4800 (BER < 10-15) by optimizing optical and electrical filter characteristics at the receiver and by compensation of dispersion. In addition, when the system performance is mainly limited by ASE noise of EDFAs, it is found that flattop-shaped optical filter at the receiver gives a better result than Gaussian-shaped filter unless the insertion loss of the optical filter is larger than 5dB.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

Improving Extensibility of DEVS Simulation Environment with Model Base by using Event Control Model Templates (이벤트 제어 모델 템플릿을 사용한 모델 라이브러리 기반 DEVS 시뮬레이션 환경의 확장성 개선)

  • Kwon, Se Jung;Lee, Jun Hee;Choi, Changbeom;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • Discrete event simulation environments often need to be modified because additional questions to systems may become apparent while observing the simulation results repeatedly. It leads to increasing development budget and depreciating the effectiveness of the environment. To avoid the modifications and to generate the altered results, this paper applies an Event Control Model (ECM) with control functions that modulate, delete and generate the events at the simulation time. In addition, this paper suggests an easier approach for domain-users, who do not want to program at source code level, by using ECM templates. The simulators with the ECMs can have better extensibility because it becomes more adaptable to possibly unanticipated changes. It prevents increasing development costs due to modifications or development of new models by M&S experts, and it provides a new alternative step to domain users. To support the effectiveness of this approach, this paper describes a relevant example, which is composed of an initial simulation model based on our empirical studies. It will show that there exist the uncountable benefits because the existing simulator is reused by domain users without new projects.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF