• Title/Summary/Keyword: Bit Expansion

Search Result 83, Processing Time 0.023 seconds

A Performance Analysis of CDMA System Based on the Combination of Bandwidth Expansion (CDMA 시스템의 대역폭확장 조합에 따른 성능분석)

  • Ryu, Kil-Hyen
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.11
    • /
    • pp.14-18
    • /
    • 2010
  • We propose a performance analysis of code division multiple access systems based on the combination of M-ary and pseudo-noise spreading. In spite of the total bandwidth expansion being equal, there is a difference in the system performance by the combination of M-ary and pseudo-noise spreading. The proposed analysis uses each bandwidth expansion, caused by M-ary and pseudo-noise spreading, rather than the total bandwidth expansion. If the signal to interference plus noise ratio becomes high, it is more effective to reduce biterror rate by bandwidth expansion of M-ary modulation rather than that of pseudo-noise spreading. Since the proposed analysis reflects the effect of the M-ary modulation, the bit error rate from the proposed analysis is closer to the results of the simulation than from the conventional analysis.

Single Image Based HDR Algorithm Using Statistical Differencing and Histogram Manipulation (통계적 편차와 히스토그램 변형을 이용한 단일영상기반 고품질 영상 생성기법)

  • Song, Jin-Sun;Han, Kyu-Phil;Park, Yang-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.7
    • /
    • pp.764-771
    • /
    • 2018
  • In this paper, we propose a high-quality image acquisition algorithm using only a single image, which the high-quality image is normally referred as HDR ones. In order to acquire the HDR image, conventional methods need many images having different exposure values at the same scene and should delicately adjust the color values for a bit-expansion or an exposure fusion. Thus, they require considerable calculations and complex structures. Therefore, the proposed algorithm suggests a completely new approach using one image for the high-quality image acquisition by applying statistical difference and histogram manipulation, or histogram specification, techniques. The techniques could control the pixel's statistical distribution of the input image into the desired one through the local and the global modifications, respectively. As the result, the quality of the proposed algorithm is better than those of conventional methods implemented in commercial image editing softwares.

Color Images Watermarking Based on Wavelet Transform (웨이블릿 변환 기반의 컬러영상 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1828-1834
    • /
    • 2007
  • This study proposes a new digital watermarking technique based on wavelet transformation on color image. First the $YC_bC_r$ coordinates obtain from RGB color space. then, the correlation of watermark is decreased by Arnold transformation. Next, watermark which has been enlarged by Linear Bit-expansion is inserted at a given intensity in Color images' low frequency sub-bands. When detecting the presence of watermark, F-norm function is applied. As a result of the various experiments on color images, the proposed watermarking technique has outstanding quality in regards to fidelity and robustness.

Evaluation of Pull-out Performance of Torsion Control Expansion Anchor According to Drill Bit Diameter (드릴비트 직경에 따른 비틀림 제어 확장 앵커의 인발성능 평가)

  • Kyoung-Hun Chae;Tae-Wo Park;Moo-Won Hur;Yeong-Seung An;Ju-Yeon Han
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.1
    • /
    • pp.64-70
    • /
    • 2023
  • In this study, reliability tests of torsion control expansion anchors according to drill bit diameters were performed. The standard deviation and coefficient of variation of the anchor were reviewed through the tests for each variable, and the results were compared and evaluated with the standard test results. As a result of the reliability test of the M12 and M16 anchors with 1.04 times the drill bit diameter, they were within 20% of the ultimate tensile load permissible standard coefficient of variation. It was found that the pulling-out performance of the anchor installed in the large hole was sufficiently secured. However, it was found to be about 253% and 210% of the design strength, indicating that the pulling performance of the anchor installed in 1.04 times the drill bit diameter was sufficiently secured. As a result of the reliability test of the M12 and M16 anchors with 1.02 times the drill bit diameter, the value of the coefficient of variation of the ultimate tensile load limit was within 20%, which satisfies the test standard. It was shown to be about 136% and 168% of the design strength, indicating that the pulling-out performance of the anchor installed in 1.02 times the drill bit diameter is sufficiently secured.

A Study on Extension of One-bit of the Parallel Interface type Digital-to-Analog Conversion Circuit (병렬 인터페이스형 디지털/아날로그 변환회로의 1개 비트 확장에 관한 연구)

  • Kwon, Sung-Yeol;Lee, Hyun-Chang
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.1-7
    • /
    • 2021
  • In this paper, a method of extending 1 bit by adding an external device to a parallel interface type Digital-to-Analog conversion(D/A C) circuit is presented. To do this, the principle of the D/A C circuit was examined, and the problems that occur when extending one bit by adding individual devices were analyzed, and a bit extension method of the D/A devices using an OP-Amp. circuit was presented. As the proposed method uses the high-precision characteristics of the OP-Amp., even if an error occurs in the device, only the overall size of the output waveform is affected, and the voltage reversal phenomenon that occurs between each bit does not occur. In order to confirm the effect of the proposed method, an experimental circuit was constructed and the absolute voltage of the output and the relative error were measured. As a result, a voltage error of 0.0756% appeared, confirming that the 0.195% requirement for one bit expansion by adding individual devices was sufficiently satisfied.

Parallel Transmission and Recovery Methods of Images Using the Two Dimensional Fiber-Optic Code-Division Multiple-Access System (2차원 광부호분할 다중접속 시스템에 의한 영상의 병렬 전송과 복원법)

  • Lee, Tae-Hoon;Park, Young-Jae;Seo, Ik-Su;Park, Jin-Bae
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.12
    • /
    • pp.683-689
    • /
    • 2000
  • Two-dimensional(2-D) fiber-optic code-division multiple-access(FO-CDMA) system utilizes the optical orthogonal signature pattern code(OOSPC) to encode and decode 2-D data. Encoded 2-D data are spatially multiplexed and transmitted through an image fiber and receiver recovers the intended data by means of thresholding process. OOSPC's construction methods based on expansion of the optical orthogonal code, which is used in one-dimensional(1-D) FO-CDMA system, are introduced. Each OOSPC's performances are compared by using the bit error rate(BER) of interfering OOSPC's of other users. From the results we verify that a balanced incomplete block design(BIBD) construction has the best performance among other mehtods. We also propose a decomposed bit-plane method for parallel transmission and recovery of 256 gray-scale images using OOSPC's constructed by the BIBD method. The simulation result encourages the feasibility of parallel transmission and recovery of multiuser's images.

  • PDF

Performance of hybrid spead spectrum systems in rayleigh fading channel (레일레이 페이딩 채널에서 하이브리드 확산대역 시스팀의 성능)

  • 조현욱;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.8
    • /
    • pp.2023-2032
    • /
    • 1996
  • In this paper, we calculate average bit error probabilities of asynchronous hybrid DS/FH-SSMA systems in AWGN chnnel and nonselective Rayleigh fading channel. We analyze and compare the performance of systems in AWGN channel and Rayleigh fading channel by using linear correlation receiver and hard limiting correlation receiver(nonlinear correlation receiver). Binary PSK scheme is considered and random spreading code sequences and random hopping patterns are used. Bit error probabilities of the systems with/without near-far problem under the same bandwidth expansion are calculated. the result shows that the performance of hard limiting correlation receiver is better than that of linear correlation receiver over nonselective Rayleigh fading channel.

  • PDF

A Study on Development of H8 MCU IDB(Integrated development board) for Embedded Education (임베디드 기술 교육용 H8 MCU 통합개발보드 개발에 관한 연구)

  • Huh, Hyun;Lee, Jaehak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.1
    • /
    • pp.53-59
    • /
    • 2009
  • By the use of open source and 16bit Microcomputer, IDB(Integrated Development Board) for embedded technical education was designed and developed. Based on 16bit MCU H8/300H, LED, LED Matrix, motors, sensors and various I/O circuitry, and the connection to a computer via the SCI, and $16{\times}2$ character LCD was designed and implemented on IDB. In addition, the software development environment was build by the assembler and H8 C compiler which is provided to the open-source software. And memory expansion was considered to include TRON(Real time OS) and uClinux. To verify the developed board, IDB was fabricated by PCB machine, and the fuction was confirmed by the basic I/O control program.

  • PDF

A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage (해밍 웨이트 누출 기반 ARIA 키 확장 SPA)

  • Park, Aesun;Han, Dong-Guk;Choi, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1319-1326
    • /
    • 2015
  • The symmetric key encryption algorithms, such as the AES or the ARIA, generate round keys by the key expansion mechanism. While the algorithm is executed, key expansion mechanism emits information about the secret key by the power consumption. The vulnerability exists that can reduce significantly the candidate of the secret key by the simple power analysis attack using a small number of the power traces. Therefore, we'll have to study about the attack and the countermeasure to prevent information leakage. While a simple power analysis attack on the AES key expansion has been studied since 2002, ARIA is insufficient. This paper presents a simple power analysis attack on 8-bit implementations of the ARIA-128 key expansion. The presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key. We show that ARIA is vulnerable to a SPA attack based on hamming weight leakage.

Implementation of a PWM Controlled Active AC Power Filter Using a Fast PWM Control Method (PWM 제어 능동 교류 전력 필터의 개발 및 속도 개선)

  • Kim, Jae-Hyun;Park, In-Gyu;Park, Jong-Keun
    • Proceedings of the KIEE Conference
    • /
    • 1987.11a
    • /
    • pp.457-462
    • /
    • 1987
  • This paper deals with the PWM controlled active AC power filter. A new PWM control method from the viewpoint of speed and simplicity is proposed. And a microprocessor-based controller is used to realize the active AC power filter. The existing PWM control methods are primarily based on Fourier series expansion and these methods need FFT calculation and solving nonlinear harmonic equations, which are heavy burden to real-time control. The proposed method is based upon generalized pulse series expansion and needs only definite integrals of harmonic signal. So, computational effort can be reduced by a large margin. The digital circuit using 16-bit microprocessor is designed to implement the actual active power filler.

  • PDF