• Title/Summary/Keyword: Detection scheme

Search Result 1,692, Processing Time 0.028 seconds

Blind Adaptive Multiuser Detection for the MC-CDMA Systems Using Orthogonalized Subspace Tracking

  • Ali, Imran;Kim, Doug-Nyun;Lim, Jong-Soo
    • ETRI Journal
    • /
    • v.31 no.2
    • /
    • pp.193-200
    • /
    • 2009
  • In this paper, we study the performance of subspace-based multiuser detection techniques for multicarrier code-division multiple access (MC-CDMA) systems. We propose an improvement in the PASTd algorithm by cascading it with the classical Gram-Schmidt procedure to orthonormalize the eigenvectors after their sequential extraction. The tracking of signal subspace using this algorithm, which we call OPASTd, has a faster convergence as the eigenvectors are orthonormalized at each discrete time sample. This improved PASTd algorithm is then used to implement the subspace blind adaptive multiuser detection for MC-CDMA. We also show that, for multiuser detection, the complexity of the proposed scheme is lower than that of many other orthogonalization schemes found in the literature. Extensive simulation results are presented and discussed to demonstrate the performance of the proposed scheme.

  • PDF

A Combining Scheme for Partial Incremental Redundancy based Hybrid Automatic Repeat Request in MIMO Systems (다중 안테나 시스템에서 부분 증분 리던던시 방식 Hybrid ARQ를 위한 결합 기법)

  • Park, Sang-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.11
    • /
    • pp.19-23
    • /
    • 2010
  • In this paper, we propose a combining scheme for partial IR based hybrid ARQ in MIMO systems. The proposed combining scheme is a symbol-level combining scheme for repeatedly transmitted systematic symbols in partial IR based hybrid ARQ. In this paper, it is shown that the proposed combining scheme can also enhance the detection performance of the parity symbols that are newly transmitted in each retransmission. Simulation results show that the proposed combining scheme significantly improves the performance of the partial IR based hybrid ARQ compared to the cases of the conventional bit-level combining scheme, especially with the ZF detection.

Pulse Repetition Based Selective Detection Scheme for Coherent IR-UWB Systems (Coherent IR-UWB 시스템을 위한 펄스 반복 전송 기반의 선택적 검출 기법)

  • Kim, Se-Kwon;Kim, Jae-Woon;Shin, Yo-An
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.3
    • /
    • pp.19-26
    • /
    • 2008
  • We propose a selective detection scheme based on pulse repetition considering the BER (Bit Error Rate) performance and complexity of coherent IR-UWB (Impulse Radio-Ultra Wide Band) systems. To take system complexity into account, the proposed scheme transmits the UWB signals by pulse repetition at the transmitter, like conventional PRC (Pulse Repetition Coding). However, to effectively improve BER performance of the system, the proposed scheme performs selective detection by estimating the SNR (Signal-to-Noise Ratio) of the received pulse-repeated signal at the UWB receiver. Hence, the proposed scheme effectively improves BER performance of the coherent IR-UWB systems without increasing system complexity, as compared to the conventional PRC algorithm.

Unsupervised Scheme for Reverse Social Engineering Detection in Online Social Networks (온라인 소셜 네트워크에서 역 사회공학 탐지를 위한 비지도학습 기법)

  • Oh, Hayoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.129-134
    • /
    • 2015
  • Since automatic social engineering based spam attacks induce for users to click or receive the short message service (SMS), e-mail, site address and make a relationship with an unknown friend, it is very easy for them to active in online social networks. The previous spam detection schemes only apply manual filtering of the system managers or labeling classifications regardless of the features of social networks. In this paper, we propose the spam detection metric after reflecting on a couple of features of social networks followed by analysis of real social network data set, Twitter spam. In addition, we provide the online social networks based unsupervised scheme for automated social engineering spam with self organizing map (SOM). Through the performance evaluation, we show the detection accuracy up to 90% and the possibility of real time training for the spam detection without the manager.

Performance Analysis of Cyclostationary Signal Detection Scheme for LTE System (LTE 시스템을 위한 Cyclostationary 신호 검출 기법의 성능 분석)

  • Kim, Seung Jong;Kim, Kyung Ho;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.28-32
    • /
    • 2014
  • In this paper, we analyzed the performance of cyclostationary signal detection scheme for LTE system. We applied the cyclostationary signal detection scheme to the cognitive radio(CR) technology, which improves the usage efficiency of spectrums and shares frequencies, and we detected the signal in the long term evolution(LTE) band. LTE system has been designated as the standard to improve the maximum data rate and provide the low latency in the 3rd generation partnership project(3GPP). In this paper, we generated the LTE signals based on the orthogonal frequency division multiple access(OFDMA) and analyzed the performance of signal detection in accordance with the segment and threshold of the generated signals. Gaussian channel was used in the simulation and we discussed the future studies to apply the CR to the LTE system.

Threshold Determination Methods for Cognitive Radio in Real DTV Bandwidth (실제 DTV 대역에서 인지 무선 시스템 적용을 위한 임계값 결정 방법)

  • Kim, Seung Jong;Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.1
    • /
    • pp.22-27
    • /
    • 2014
  • In this paper, we analyzed performance of FFT based on pilot sensing scheme for DTV signal in fading environments. In order to detect the present and absent for advanced television system committee digital television (ATSC DTV), a pilot detection scheme based on FFT is employed. Also, these signals are applied to each fading environment. For evaluating the spectrum sensing performance, detection probability is derived. When threshold is decided, we refer to constant false alarm rate (CFAR) scheme. From simulation results, it is confirmed that the spectrum sensing performance is improved as increase of the false alarm rate. The result of this paper can be applied to implement the spectrum sensing part of cognitive radio (CR) systems.

Image Compression and Edge Detection Based on Wavelet Transforms (웨이블릿 기반의 영상 압축 및 에지 검출)

  • Jung il Hong;Kim Young Soon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2005
  • The basis function of wavelet transform used in this paper is constructed by using lifting scheme, which is different from general wavelet transform. Lifting scheme is a new biorthogonal wavelet con-structing method, that does not use Fourier transform for constructing its basis function. In this paper, an image compression and reconstruction method using the lifting scheme was proposed. And this method improves data visualization by supporting a partial reconstruction and a local reconstruction. Approx- imations at various resolutions allow extracting various sizes of feature from an image or signal with a small amount of original information. An approximation with small size of scaling coefficients gives a brief outline of features at fast. Image compression and edge detection techniques provide good frame- works for data management and visualization in multimedia database.

  • PDF

Application of an Iterative 2D Equalizer to Holographic Data Storage Systems (반복 2차 등화기의 홀로그래픽 데이터 저장 장치 적용)

  • Kim, Sun-Ho;Im, Sung-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.1-5
    • /
    • 2012
  • At the present time when the limits of the magnetic storage systems appear, the holographic data storage (HDS) devices with high data transfer rate and high recording density are emerging as attractive candidates for next-generation optical storage devices. In this paper, to effectively improve the detection performance that is degraded by the two-dimensional inter-symbol interference under the HDS channel environment and the pixel misalignment, an iterative two-dimensional equalization scheme is proposed based on the contraction mapping theorem. In order to evaluate the performance of the proposed scheme, for various holographic channel environments we measure the BER performance using computer simulation and compare the proposed one with the conventional threshold detection scheme, which verifies the superiority of the proposed scheme.

An Improved Detecting Scheme of Malicious Codes using HTTP Outbound Traffic (HTTP Outbound Traffic을 이용한 개선된 악성코드 탐지 기법)

  • Choi, Byung-Ha;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.47-54
    • /
    • 2009
  • Malicious codes, which are spread through WWW are now evolved with various hacking technologies However, detecting technologies for them are seemingly not able to keep up with the improvement of hacking and newly generated malicious codes. In this paper, we define the requirements of detecting systems based on the analysis of malicious codes and their spreading characteristics, and propose an improved detection scheme which monitors HTTP Outbound traffic and detects spreading malicious codes in real time. Our proposed scheme sets up signatures in IDS with confirmed HTML tags and Java scripts which spread malicious codes. Through the verification analysis under the real-attacked environment, we show that our scheme is superior to the existing schemes in satisfying the defined requirements and has a higher detection rate for malicious codes.

Seamless Mobility Management in IP-based Wireless/Mobile Networks with Fast Handover

  • Park, Byung-Joo;Hwang, Eun-Sang;Park, Gil-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.266-284
    • /
    • 2009
  • The challenges of rapidly growing numbers of mobile nodes in IPv6-based networks are being faced by mobile computing researchers worldwide. Recently, IETF has standardized Mobile IPv6 and Fast Handover for Mobile IPv6(FMIPv6) for supporting IPv6 mobility. Even though existing literatures have asserted that FMIPv6 generally improves MIPv6 in terms of handover speed, they did not carefully consider the details of the whole handover procedures. Therefore, in conventional protocols, the handover process reveals numerous problems manifested by a time-consuming network layer based movement detection and latency in configuring a new care of address with confirmation. In this article, we study the impact of the address configuration and confirmation procedure on the IP handover latency. To mitigate such effects, we propose a new scheme which can reduce the latency taken by the movement detection, address configuration and confirmation from the whole handover latency. Furthermore, a mathematical analysis is provided to show the benefits of our scheme. In the analysis, various parameters are used to compare our scheme with the current procedures, while our approach is focused on the reduction of handover latency. Finally, we demonstrate total handover scenarios for the proposed techniques and discussed the major factors which contribute to the handover latency.