• Title/Summary/Keyword: Mutual Channel

Search Result 123, Processing Time 0.024 seconds

An algorithm for pattern recognition of multichannel ECG signals using AI (AI기법을 이용한 멀티채널 심전도신호의 패턴인식 알고리즘)

  • 신건수;이병채;황선철;이명호
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.575-579
    • /
    • 1990
  • This paper describes an algorithm that can efficiently analyze the multichannel ECG signal using the frame. The input is a set of significant features (points) which have been extracted from an original sampled signal by using the split-and-merge algorithm. A signal from each channel can be hierarchical ADN/OR graph on the basis of the priori knowledge for ECG signal. The search mechanisms with some heuristics and the mixed paradigms of data-driven hypothesis formation are used as the major control mechanisms. The mutual relations among features are also considered by evaluating a score based on the relational spectrum. For recognition of morphologies corresponding to OR nodes, an hypothesis modification strategy is used. Other techniques such as instance, priority update of prototypes, and template matching facility are also used. This algorithm exactly recognized the primary points and supporting points from the multichannel ECG signals.

  • PDF

1.25 Gb/s Broadcast Signal Transmission in WDM-PON Based on Mutually Injected Fabry-Perot Laser Diodes

  • Yoo, Sang-Hwa;Mun, Sil-Gu;Kim, Joon-Young;Lee, Chang-Hee
    • Journal of the Optical Society of Korea
    • /
    • v.16 no.2
    • /
    • pp.101-106
    • /
    • 2012
  • We demonstrate a cost effective broadcast signal transmission at 1.25-Gb/s with 100 GHz channel spacing based on a broadband light source (BLS) for a wavelength division multiplexing-passive optical network (WDM-PON). The BLS is implemented by using mutually injected Fabry-Perot laser diodes (MI F-P LDs). The error-free transmission without a forward error correction (FEC) is achieved by its low relative intensity noise (RIN). The number of usable modes is determined by RIN and/or extinction ratio (ER) in the spectrum sliced light output.

Comparative study of OFDMA cooperative relaying methods in Rayleigh fading channel (레일레이 퍼이딩 채널에서 OFDMA 협동 릴레이 방식에 따른 성능비교)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.109-115
    • /
    • 2009
  • Recently, the relay communication is focused for the power saving and coverage extension of ad-hoc networks. For the high date rate transmission, it is proposed to adapt OFDMA relays. In this paper, we assume the 2 hop cooperative OFDMA relays between the source and the destination. The performance of 3 different relaying methods are derived and compared. We noticed that the selective OFDMA relaying method has the best performance followed by opportunistic OFDMA relaying and repetition-based OFDMA relaying method under the same threshold mutual information rate.

  • PDF

A Study on Co-Channel Interference of FH Spread Spectrum Communications (대역확산통신에서 FH무전기의 상호간섭연구)

  • Choe Eun-Jae;Kim Je-Yeong;Yun Byeong-Chang;Bae Hyeon-Ung;Lee Si-Chang
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.2
    • /
    • pp.118-134
    • /
    • 1990
  • This paper considers the mutual interference problem of several users employing the same FH systems in selected multiple user environments. The environment consists of a desired transmitter-receiver pair located in an area where there are M interfering users distributed in accordance with a specified probability density function. Both coherent Phase-Shift-Keyed and incoherent Frequencey-Shift-Keyed modulations are considered. The general formulas of the average bit error probability are derived. The calculation results are summarized and analyzed. The average bit error probability is highly dependent on the relative location of interferences to the desired link, the time duty factor of the hopping and the number of available channels.

  • PDF

The Performance Evaluation of FH-SSMA Radio Systems (주파수 도약 대역확산 다중 시스템의 성능평가)

  • 조형래;강경원;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1271-1278
    • /
    • 1992
  • In this paper, a practical model for evaluating and comparing the bit error rates(BERs) due to adjacent channel mutual interference in a synchronous and asynchronous frequency hopped spread spectrum multiple access(FH-SSMA) radio communication systems is proposed. After implementing the actual FH radio in both the sychronous and asynchronous case, the BER is computed and measured. An experiment of this system in mobile tactical environments reveals that the performance in the asynchronous case is lower than that of the synchronous case. The computer simulation model is an efficient tool for designing practical FH radios in mobile communication environments.

  • PDF

Effect Analysis of Guard Band and Quantization Level on BER Performance in OBP Satellite Systems (OBP 위성 시스템에서 보호 대역과 양자화 레벨이 BER 성능에 미치는 영향 분석)

  • Kang, Ki-Wan;Yoon, Dong-Weon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.7
    • /
    • pp.709-715
    • /
    • 2010
  • MCDD performs demultiplexing and demodulation of multi-carrier signals for signal processing schemes such as switching, channel encoding and remodulation in an OBP satellite. During the demultiplexing procedure, several factors such as frequency offset and/or quantization error degrade BER performance. Hence, influences of those factors should be reduced. A influence of the frequency offset can be reduced by inserting guard band between channels, and that of quantization error can be decreased by quantization level control. In case that the data rate of system is not limited, the guard band and the quantization level do not affect each other. In the other case, however, mutual influence between them should be considered. In this paper, we observe the mutual influence when the data rate of the MCDD is limited, and analyze the BER performance.

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

Structural vulnerability analysis and improvement of a biometrics-based remote user authentication scheme of Li and Hwang's (Li & Hwang's 생체기반 인증스킴에 대한 취약성 분석 및 개선)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.107-115
    • /
    • 2012
  • Recently, Li and Hwang scheme proposed a biometrics-based remote user authentication scheme using smart card. It is asserted that this scheme has very excellent benefits by the operation cost efficiency based on the smart card, one-way function and biometrics using random numbers. But this scheme cannot provide the properly authentication, especially, it is analyzed as the vulnerable security scheme for Denial-of-Service(DoS) attacks by impersonate attacks. The attacker controls the insecure channel, they can easily fabricate messages to pass the user's or server's authentication, and the malicious attacker can impersonate the user to cheat the server and can impersonate the server to cheat the user without knowing any secret information. This paper proposes the strong improved scheme which can respond to multiple attacks by supplementing the function of integrity check from the server which applied variable authenticator and OSPA without exposing the user's password information. It is supplemented pregnable of disguise attack and mutual authentication of Li and Hwang scheme.

A Cognitive Beamforming Scheme for Cross-Tier Interference Mitigation in Heterogeneous Cellular Networks (이종 셀룰러 망에서 계층 간 간섭완화를 위한 인지 빔형성 기법)

  • Seo, Ju-yeol;Park, Seungyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1387-1401
    • /
    • 2016
  • When a closed access policy in which only an authorized user is allowed to access to a given base station (BS) has been employed in heterogeneous cellular networks, a macro-cell user is used to experience strong cross-tier interference from its adjacent small-cell BSs to which the user is not allowed to access. To mitigate this problem, it has been proposed that a small-cell BS employs a beamforming vector which is orthogonal to the channel of the victim user. However, this technique requires considerable mutual exchange of information among the macro-cell BS, the macro-cell user, and the small-cell BS. In this paper, we propose a cognitive beamforming scheme, in which a small-cell BS employs the beamforming orthogonal to the victim users' channel without any explicit mutual information exchange. Particularly, the small-cell BS finds small- and macro-cell users experiencing the co-tier and cross-tier interferences from it, respectively. Then, it employs a beamforming which is orthogonal to the victim users' channels to mitigate the co-tier and cross-tier interferences. Using the system-level simulation, we demonstrate that the proposed scheme effectively mitigates the cross-tier interference problem.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.