• Title/Summary/Keyword: K-Code

Search Result 8,838, Processing Time 0.037 seconds

Performance Analysis of Signal Acquisition in L2C Assisted GPS Receivers (L2C AGPS 수신기의 신호 획득 성능 분석)

  • Song, Seung-Hun;Park, Ji-Won;Park, Ji-Hee;Sung, Tae-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.61-67
    • /
    • 2011
  • The GPS new civil signal is modulated on the L2 carrier at a frequency of 1227.6MHz. The L2C signal is composed of two multiplexed code signals, which include CM code with a 10,230 chip sequency repeating every 20ms, and CL code which has a 767,250 chip sequency repeating every 1.5 seconds. Thus, the new civil signal have much improved cross correlation properties so that the position fixing can be possible even with very weak signals. However, it requires very long acquisition time because of its long code length. This paper presents an efficient signal acquisition method for L2C AGPS receiver. Snapshot mode and coarse time assistance are assumed and total integration time is given by 1.5 sec. By SNR worksheet and computer simulation, it is proven that L2C signal can be acquired with very weak power less than -150dBm. Considering the acquisition time and the sensitivity, it is recommended that the highest power signal is acquired with CM code first to reduce TTFF. By the timing synchronization, at this time, search space of the code phase for other signals can be greatly reduced so that CL code can be used in signal acquisition to maximize sensitivity with small computation.

Improving The Performance of Turbo Code by Optimizing QAM Constellation (QAM 변조방식의 성상도 최적화를 통한 이진 터보 부호의 성능 개선)

  • Lee, Keun-Hyung;Lee, Ji-Yeon;Kang, Dong-Hoon;Oh, Wang-Rok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.7
    • /
    • pp.39-44
    • /
    • 2009
  • It is well-known that the performance of turbo codes can be improved by allocating different energies per code symbol. In this paper, based on this observation, we propose a joint encoding and modulation scheme for quadrature amplitude modulated turbo code systems. In the proposed scheme, the amount of energy difference between the turbo coded symbols is optimized by optimizing the constellation of quadrature amplitude modulation (QAM). The proposed scheme offers better coding gain compared to the conventional combination of binary turbo code and QAM at the bit error rate of 10$^{-5}$. Also, the performance of binary turbo codes with the proposed QAM constellation for various code symbol mapping strategies are verified.

Software Code Attestation for IoT Devices by Bluetooth Low Energy (저전력 블루투스를 통한 사물 인터넷 장치의 소프트웨어적인 코드 검증)

  • Kim, GeunYoung;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1211-1221
    • /
    • 2016
  • In IoT environment, making sure of trust of IoT devices is the most important one than others. The security threats of nowadays almost stay at exposure or tampering of information. However, if human life is strongly connected to the Internet by IoT devices, the security threats will probably target human directly. In case of devices, authentication is verified using the device-known private key. However, if attacker can modify the device physically, knowing the private key cannot be the evidence of trust any more. Thus, we need stronger verification method like code attestation. In this paper, we use software-based code attestation for efficiency. We also suggest secure code attestation method against copy of original code and implement it on embedded device and analyze its performance.

Malicious Code Detection using the Effective Preprocessing Method Based on Native API (Native API 의 효과적인 전처리 방법을 이용한 악성 코드 탐지 방법에 관한 연구)

  • Bae, Seong-Jae;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.785-796
    • /
    • 2012
  • In this paper, we propose an effective Behavior-based detection technique using the frequency of system calls to detect malicious code, when the number of training data is fewer than the number of properties on system calls. In this study, we collect the Native APIs which are Windows kernel data generated by running program code. Then we adopt the normalized freqeuncy of Native APIs as the basic properties. In addition, the basic properties are transformed to new properties by GLDA(Generalized Linear Discriminant Analysis) that is an effective method to discriminate between malicious code and normal code, although the number of training data is fewer than the number of properties. To detect the malicious code, kNN(k-Nearest Neighbor) classification, one of the bayesian classification technique, was used in this paper. We compared the proposed detection method with the other methods on collected Native APIs to verify efficiency of proposed method. It is presented that proposed detection method has a lower false positive rate than other methods on the threshold value when detection rate is 100%.

The Analysis of Performance for W-CDMA System using Channel Coding & Phse Hopping 4-Tx Space-Time Code over ITU-R realistic channel model. (ITU-R 실측 채널 모델에서 채널 코딩과 Phase Hopping 4-Tx 시공간 부호를 적용한 W-CDMA 시스템의 성능분석)

  • Park Jeong-Hyun;Kim Kwang-jin;Oh Dong-jin;Kim Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.75-78
    • /
    • 2004
  • In this paper, we analyze the performance of transmitter and receiver of W-CDMA system using the channel coding and space time code in downlink over ITU-R realistic channel model. We can improve the data rate and the reliability of communications by a channel code, and we can get a diversity gain by using the space time code over fading channels. We also apply the RAKE receiver to improve a performance in multi-path fading channel environment.

  • PDF

On Jacket Matrices Based on Weighted Hadamard Matrices

  • Lee Moon-Ho;Pokhrel Subash Shree;Choe Chang-Hui;Kim Chang-Joo
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.1
    • /
    • pp.17-27
    • /
    • 2007
  • Jacket matrices which are defined to be $n{\times}n$ matrices $A=(a_{jk})$ over a field F with the property $AA^+=nI_n$ where $A^+$ is the transpose matrix of elements inverse of A,i.e., $A^+=(a_{kj}^-)$, was introduced by Lee in 1984 and are used for signal processing and coding theory, which generalized the Hadamard matrices and Center Weighted Hadamard matrices. In this paper, some properties and constructions of Jacket matrices are extensively investigated and small orders of Jacket matrices are characterized, also present the full rate and the 1/2 code rate complex orthogonal space time code with full diversity.

A Subchannel Analysis Code for LMR Core Subassembly Thermal Hydraulic Analysis: The MATRA-LMR

  • Lim, Hyun-Jin;Kim, Young-Gyun;Kim, Yeong-Il;Oh, Se-Kee
    • Journal of Energy Engineering
    • /
    • v.12 no.4
    • /
    • pp.281-288
    • /
    • 2003
  • The MATRA-LMR code has been developed based on a subchannel analysis method for LMR (Liquid Metal Reactor) core subassembly thermal hydraulic design and analysis. The code was improved to allow a seven assembly calculation and can account for inter-assembly heat transfer based on a lumped parameter model. This paper describes the main modifications and improvements of the code and shows reference calculation results which compared single assembly calculation with seven assembly calculation cased for driver and blanket subassemblies of the KALIMER 150 MWe breakeven conceptual design core. KAL- IMER is a pool-type sodium cooled reactor with a thermal output of 392.0 MWth, which have inherently safe, environmentally friendly, proliferation-resistant and economically viable reactor concepts.

MIDLOOP Code Analysis of a ROSA-IV/LSTF Experiment for the Loss of Residual Heat Removal System Event During Mid- loop Operation

  • Han, Kee-Soo;Lee, Cheol-Sin;Park, Chul-Jin;Kim, Hee-Cheol
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.683-690
    • /
    • 1996
  • The MIDLOOP code has been developed for the evaluation of RES pressurization transients initiated from a loss-of-Residual Heat Removal System (RHRS) during mid-loop operation after reactor shutdown. It provides a fast running and realistic tool for studying parametrically the response of important plant parameters such as pressure, temperature, and level to various plant combinations of the primary side vent, makeup, and leakage procedures and the steam generator (SG) conditions. The code consists of ten nodes representing the primary and secondary sides of a nuclear power plant and can analyze the effect of air on the primary system pressurization and primary to secondary heat transfer. The analysis results of the MIDLOOP code are in good agreement with the ROSA-IV/LSTF experiment without opening in the RCS.

  • PDF

Design of A Downlink Power Control Scheme in Unequal Error Protection Multi-Code CDMA Mobile Medicine System

  • Lin, Chin-Feng;Lee, Hsin-Wang;Hung, Shih-Ii;Li, Ching-Yi
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.335-338
    • /
    • 2005
  • In this paper, we propose a downlink power control scheme to apply in the unequal error protection multi-code CDMA mobile medicine system. The mobile medicine system contains (i) blood pressure and body temperature measurement value, (ii) ECG medical signals measured by the electrocardiogram device, (iii) mobile patient's history, (iv) G.729 audio signal, MPEG-4 CCD sensor video signal, and JPEG2000 medical image. By the help of the multi-code CDMA spread spectrum communication system with downlink power control scheme and unequal error protection strategy, it is possible to transmit mobile medicine media and meet the quality of service. Numerical analysis and simulation results show that the system is a well transmission platform in mobile medicine.

  • PDF

Technical Issues on Implementation of GPS Signal Authentication System

  • So, Hyoungmin;Jang, Jaegyu;Lee, Kihoon;Park, Junpyo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.3
    • /
    • pp.139-146
    • /
    • 2018
  • In recent years, a satellite navigation signal authentication technique has been introduced to determine the spoofing of commercial C/A code using the cross-correlation mode of GPS P(Y) code received at two receivers. This paper discusses the technical considerations in the implementation and application of authentication system simulator hardware to achieve the above technique. The configuration of the simulator consists of authentication system and user receiver. The synchronization of GPS signals received at two devices, data transmission and reception, and codeless correlation of P(Y) code were implemented. The simulation test result verified that spoofing detection using P(Y) codeless correlation could be achieved.