• Title/Summary/Keyword: Detection scheme

Search Result 1,690, Processing Time 0.022 seconds

Frequency Domain DTV Pilot Detection Based on the Bussgang Theorem for Cognitive Radio

  • Hwang, Sung Sue;Park, Dong Chan;Kim, Suk Chan
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.644-654
    • /
    • 2013
  • In this paper, a signal detection scheme for cognitive radio (CR) based on the Bussgang theorem is proposed. The proposed scheme calculates the statistical difference between Gaussian noise and the primary user signal by applying the Bussgang theorem to the received signal. Therefore, the proposed scheme overcomes the noise uncertainty and gives scalable complexity according to the zero-memory nonlinear function for a mobile device. We also present the theoretical analysis on the detection threshold and the detection performance in the additive white Gaussian noise channel. The proposed detection scheme is evaluated by computer simulations based on the IEEE 802.22 standard for the wireless regional area network. Our results show that the proposed scheme is robust to the noise uncertainty and works well in a very low signal-to-noise ratio.

An Adaptive Checkpointing Scheme for Fault Tolerance of Real-Time Control Systems with Concurrent Fault Detection (동시 결함 검출 기능이 있는 실시간 제어 시스템의 결함 허용성을 위한 적응형 체크포인팅 기법)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.72-77
    • /
    • 2011
  • The checkpointing scheme is a well-known technique to cope with transient faults in digital systems. This paper proposes an adaptive checkpointing scheme for the reliability improvement of real-time control systems with concurrent fault detection capability. With concurrent fault detection capability the effect of transient faults are assumed to be detected with no latency. The proposed adaptive checkpointing scheme is based on the reliability analysis of an equidistant checkpointing scheme. Numerical data show the proposed adaptive scheme outperforms the equidistant scheme from a reliability point of view.

A Kidnapping Detection Using Human Pose Estimation in Intelligent Video Surveillance Systems

  • Park, Ju Hyun;Song, KwangHo;Kim, Yoo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.9-16
    • /
    • 2018
  • In this paper, a kidnapping detection scheme in which human pose estimation is used to classify accurately between kidnapping cases and normal ones is proposed. To estimate human poses from input video, human's 10 joint information is extracted by OpenPose library. In addition to the features which are used in the previous study to represent the size change rates and the regularities of human activities, the human pose estimation features which are computed from the location of detected human's joints are used as the features to distinguish kidnapping situations from the normal accompanying ones. A frame-based kidnapping detection scheme is generated according to the selection of J48 decision tree model from the comparison of several representative classification models. When a video has more frames of kidnapping situation than the threshold ratio after two people meet in the video, the proposed scheme detects and notifies the occurrence of kidnapping event. To check the feasibility of the proposed scheme, the detection accuracy of our newly proposed scheme is compared with that of the previous scheme. According to the experiment results, the proposed scheme could detect kidnapping situations more 4.73% correctly than the previous scheme.

Novel Detection Schemes Based on the Unified Receiver Architecture for SWIPT (동시 무선 정보 및 전력 전송을 위한 통합된 수신기 구조 기반의 새로운 검출 기법)

  • Kang, Jinho;Kim, Young-bin;Shin, Dae Kyu;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.268-278
    • /
    • 2017
  • In this paper, we propose two novel detection schemes with low-complexity based on the unified receiver architecture which minimizes a fundamental tradeoff at rate-energy region in SWIPT system. The proposed detection schemes are twofold: The two-stage detection scheme and Euclidean distance combination detection scheme. The two-stage detection scheme detects amplitude information of symbols from rectified signals for energy harvesting. In the sequel, it detects symbols based on phase information of baseband signals for information decoding. The Euclidean distance combination detection scheme detects symbols using linear positive-weighted sum of two metrics: Euclidean distance based on baseband signals for information decoding and Euclidean distance based on rectified signals for energy harvesting. For numerical results, we confirm that the proposed detection scheme can achieve better performance than the conventional scheme in terms of symbol error rate, symbol success rate-energy region and achievable rate-energy region.

Performance Analysis of Iterative Detection Scheme for the D-STTD System

  • Yoon, Gil-Sang;Lee, Jeong-Hwan;Cho, In-Sik;Seo, Chang-Woo;Ryoo, Sang-Jin;You, Cheol-Woo;Hwang, In-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.235-240
    • /
    • 2009
  • This paper combines various detection techniques and analyzes their performances in detecting the transmission information of the D-STTD scheme that uses, in parallel, the STTD scheme known as the Alamouti code. The D-STTD scheme adopts one of the STTD schemes for transmission to acquire diverse effects and uses another form of STTD for multiplexing effects. Due to the multiplexing effect that transmits different data, it is difficult to apply D-STTD to the conventional STTD combining technique. This paper combines the D-STTD system with linear algorithm, SIC algorithm and OSIC algorithm known as multiplexing detection scheme based on MMSE scheme. And we propose the detection scheme of the D-STTD using MAP algorithm and analyze the performance of each system. The simulation results showed that the detector using iterative algorithm has better performance than Linear MMSE Detector. Especially, we can show that the detector using MAP algorithm outperforms conventional detector.

Approximate ML Detection with the Best Channel Matrix Selection for MIMO Systems

  • Jin, Ji-Yu;Kim, Seong-Cheol;Park, Yong-Wan
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.280-284
    • /
    • 2008
  • In this paper, a best channel matrix selection scheme(BCMS) is proposed to approximate maximum likelihood(ML) detection for a multiple-input multiple-output system. For a one stage BCMS scheme, one of the transmitted symbols is selected to perform ML detection and the other symbols are detected by zero forcing(ZF). To increase the diversity of the symbols that are detected by ZF, multi-stage BCMS detection scheme is used to further improve the system performance. Simulation results show that the performance of the proposed BCMS scheme can approach that of ML detection with a significant reduction in complexity.

Performance Analysis of Trellis Detection in the TFM System (TFM 방식에서 Trellis 검파의 성능 분석)

  • 정의성;조형래;홍대식;강창언
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.29A no.7
    • /
    • pp.1-9
    • /
    • 1992
  • In this thesis, the trellis detection scheme is proposed to improve the error performance of the noncoherent detection in the TFM system. Trellis detection takes advantage of the trellis property of TFM-encoded signals. The trellis property is created by giving correlations among adjacent TFM-encoded signals at the transmitter. The performance of the trellis detection scheme is analyzed by means of the Bernoulli trials with the average symbol error probability, and is compared to that of the bit-by-bit detection scheme. As a result,when the SNR is below 20 dB in the Rayleigh fading and AWGN channel, the trellis detection is inferior to the bit-by-bit detections. But when SNR is above 20 dB, the trellis detection is superior to the bit-by-bit detection, and its performance enhancement is better as the SNR increases.

  • PDF

Performance of Seamless Handoff Scheme with Fast Moving Detection

  • Kim Dong Ok;Yoon Hong;Yoon Chong Hoo
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.588-591
    • /
    • 2004
  • This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection scheme that based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of the burst blocking probability and the link utilization.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Self-Checking Look-up Tables using Scalable Error Detection Coding (SEDC) Scheme

  • Lee, Jeong-A;Siddiqui, Zahid Ali;Somasundaram, Natarajan;Lee, Jeong-Gun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.5
    • /
    • pp.415-422
    • /
    • 2013
  • In this paper, we present Self-Checking look-up-table (LUT) based on Scalable Error Detection Coding (SEDC) scheme for use in fault-tolerant reconfigurable architectures. SEDC scheme has shorter latency than any other existing coding schemes for all unidirectional error detection and the LUT execution time remains unaffected with self-checking capabilities. SEDC scheme partitions the contents of LUT into combinations of 1-, 2-, 3- and 4-bit segments and generates corresponding check codes in parallel. We show that the proposed LUT with SEDC performs better than LUT with traditional Berger as well as Partitioned Berger Coding schemes. For 32-bit data, LUT with SEDC takes 39% less area and 6.6 times faster for self-checking than LUT with traditional Berger Coding scheme.