• 제목/요약/키워드: Detection scheme

검색결과 1,686건 처리시간 0.026초

Frequency Domain DTV Pilot Detection Based on the Bussgang Theorem for Cognitive Radio

  • Hwang, Sung Sue;Park, Dong Chan;Kim, Suk Chan
    • ETRI Journal
    • /
    • 제35권4호
    • /
    • pp.644-654
    • /
    • 2013
  • In this paper, a signal detection scheme for cognitive radio (CR) based on the Bussgang theorem is proposed. The proposed scheme calculates the statistical difference between Gaussian noise and the primary user signal by applying the Bussgang theorem to the received signal. Therefore, the proposed scheme overcomes the noise uncertainty and gives scalable complexity according to the zero-memory nonlinear function for a mobile device. We also present the theoretical analysis on the detection threshold and the detection performance in the additive white Gaussian noise channel. The proposed detection scheme is evaluated by computer simulations based on the IEEE 802.22 standard for the wireless regional area network. Our results show that the proposed scheme is robust to the noise uncertainty and works well in a very low signal-to-noise ratio.

동시 결함 검출 기능이 있는 실시간 제어 시스템의 결함 허용성을 위한 적응형 체크포인팅 기법 (An Adaptive Checkpointing Scheme for Fault Tolerance of Real-Time Control Systems with Concurrent Fault Detection)

  • 류상문
    • 제어로봇시스템학회논문지
    • /
    • 제17권1호
    • /
    • pp.72-77
    • /
    • 2011
  • The checkpointing scheme is a well-known technique to cope with transient faults in digital systems. This paper proposes an adaptive checkpointing scheme for the reliability improvement of real-time control systems with concurrent fault detection capability. With concurrent fault detection capability the effect of transient faults are assumed to be detected with no latency. The proposed adaptive checkpointing scheme is based on the reliability analysis of an equidistant checkpointing scheme. Numerical data show the proposed adaptive scheme outperforms the equidistant scheme from a reliability point of view.

A Kidnapping Detection Using Human Pose Estimation in Intelligent Video Surveillance Systems

  • Park, Ju Hyun;Song, KwangHo;Kim, Yoo-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권8호
    • /
    • pp.9-16
    • /
    • 2018
  • In this paper, a kidnapping detection scheme in which human pose estimation is used to classify accurately between kidnapping cases and normal ones is proposed. To estimate human poses from input video, human's 10 joint information is extracted by OpenPose library. In addition to the features which are used in the previous study to represent the size change rates and the regularities of human activities, the human pose estimation features which are computed from the location of detected human's joints are used as the features to distinguish kidnapping situations from the normal accompanying ones. A frame-based kidnapping detection scheme is generated according to the selection of J48 decision tree model from the comparison of several representative classification models. When a video has more frames of kidnapping situation than the threshold ratio after two people meet in the video, the proposed scheme detects and notifies the occurrence of kidnapping event. To check the feasibility of the proposed scheme, the detection accuracy of our newly proposed scheme is compared with that of the previous scheme. According to the experiment results, the proposed scheme could detect kidnapping situations more 4.73% correctly than the previous scheme.

동시 무선 정보 및 전력 전송을 위한 통합된 수신기 구조 기반의 새로운 검출 기법 (Novel Detection Schemes Based on the Unified Receiver Architecture for SWIPT)

  • 강진호;김영빈;신대규;최완
    • 한국통신학회논문지
    • /
    • 제42권1호
    • /
    • pp.268-278
    • /
    • 2017
  • 본 논문에서는 동시 무선 정보 및 전력 전송 시스템에서 전송률-에너지 영역 관점에서의 근본적인 트레이드오프를 최소화하기 위해 제안되었던 새로운 수신기 구조를 기반으로 복잡도가 낮은 새로운 검출 기법들을 제안한다. 첫 번째로 에너지 하베스팅을 위한 정류된 신호로부터 얻을 수 있는 진폭 정보를 통해 유클리드 거리 기반으로 부호의 진폭을 먼저 검출한 후 기존의 정보 복호화 과정에서 얻을 수 있는 위상 정보를 통해 유클리드 거리를 기반으로 최종 부호를 검출하는 이단 검출 기법을 제안한다. 두 번째로 기존의 정보 복호화 과정을 통해 얻을 수 있는 진폭과 위상 정보를 포함한 유클리드 거리와 에너지 하베스팅을 위한 정류된 신호로부터 얻을 수 있는 진폭정보를 포함한 유클리드 거리를 결합하여 부호를 검출 할 수 있는 유클리드 거리 결합 검출 기법을 제시한다. 모의실험을 통해 부호 에러율과 부호 성공률-에너지 영역, 달성 가능한 전송률-에너지 영역 측면에서 기존의 정보 복호화 기법보다 우수한 성능을 얻음을 확인하였다.

Performance Analysis of Iterative Detection Scheme for the D-STTD System

  • Yoon, Gil-Sang;Lee, Jeong-Hwan;Cho, In-Sik;Seo, Chang-Woo;Ryoo, Sang-Jin;You, Cheol-Woo;Hwang, In-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.235-240
    • /
    • 2009
  • This paper combines various detection techniques and analyzes their performances in detecting the transmission information of the D-STTD scheme that uses, in parallel, the STTD scheme known as the Alamouti code. The D-STTD scheme adopts one of the STTD schemes for transmission to acquire diverse effects and uses another form of STTD for multiplexing effects. Due to the multiplexing effect that transmits different data, it is difficult to apply D-STTD to the conventional STTD combining technique. This paper combines the D-STTD system with linear algorithm, SIC algorithm and OSIC algorithm known as multiplexing detection scheme based on MMSE scheme. And we propose the detection scheme of the D-STTD using MAP algorithm and analyze the performance of each system. The simulation results showed that the detector using iterative algorithm has better performance than Linear MMSE Detector. Especially, we can show that the detector using MAP algorithm outperforms conventional detector.

Approximate ML Detection with the Best Channel Matrix Selection for MIMO Systems

  • Jin, Ji-Yu;Kim, Seong-Cheol;Park, Yong-Wan
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.280-284
    • /
    • 2008
  • In this paper, a best channel matrix selection scheme(BCMS) is proposed to approximate maximum likelihood(ML) detection for a multiple-input multiple-output system. For a one stage BCMS scheme, one of the transmitted symbols is selected to perform ML detection and the other symbols are detected by zero forcing(ZF). To increase the diversity of the symbols that are detected by ZF, multi-stage BCMS detection scheme is used to further improve the system performance. Simulation results show that the performance of the proposed BCMS scheme can approach that of ML detection with a significant reduction in complexity.

TFM 방식에서 Trellis 검파의 성능 분석 (Performance Analysis of Trellis Detection in the TFM System)

  • 정의성;조형래;홍대식;강창언
    • 전자공학회논문지A
    • /
    • 제29A권7호
    • /
    • pp.1-9
    • /
    • 1992
  • In this thesis, the trellis detection scheme is proposed to improve the error performance of the noncoherent detection in the TFM system. Trellis detection takes advantage of the trellis property of TFM-encoded signals. The trellis property is created by giving correlations among adjacent TFM-encoded signals at the transmitter. The performance of the trellis detection scheme is analyzed by means of the Bernoulli trials with the average symbol error probability, and is compared to that of the bit-by-bit detection scheme. As a result,when the SNR is below 20 dB in the Rayleigh fading and AWGN channel, the trellis detection is inferior to the bit-by-bit detections. But when SNR is above 20 dB, the trellis detection is superior to the bit-by-bit detection, and its performance enhancement is better as the SNR increases.

  • PDF

Performance of Seamless Handoff Scheme with Fast Moving Detection

  • Kim Dong Ok;Yoon Hong;Yoon Chong Hoo
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.588-591
    • /
    • 2004
  • This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection scheme that based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of the burst blocking probability and the link utilization.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제18권2호
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Self-Checking Look-up Tables using Scalable Error Detection Coding (SEDC) Scheme

  • Lee, Jeong-A;Siddiqui, Zahid Ali;Somasundaram, Natarajan;Lee, Jeong-Gun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제13권5호
    • /
    • pp.415-422
    • /
    • 2013
  • In this paper, we present Self-Checking look-up-table (LUT) based on Scalable Error Detection Coding (SEDC) scheme for use in fault-tolerant reconfigurable architectures. SEDC scheme has shorter latency than any other existing coding schemes for all unidirectional error detection and the LUT execution time remains unaffected with self-checking capabilities. SEDC scheme partitions the contents of LUT into combinations of 1-, 2-, 3- and 4-bit segments and generates corresponding check codes in parallel. We show that the proposed LUT with SEDC performs better than LUT with traditional Berger as well as Partitioned Berger Coding schemes. For 32-bit data, LUT with SEDC takes 39% less area and 6.6 times faster for self-checking than LUT with traditional Berger Coding scheme.