• Title/Summary/Keyword: PN(Pseudo-Noise)

Search Result 85, Processing Time 0.022 seconds

A Performance Analysis of CDMA System Based on the Combination of Bandwidth Expansion (CDMA 시스템의 대역폭확장 조합에 따른 성능분석)

  • Ryu, Kil-Hyen
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.11
    • /
    • pp.14-18
    • /
    • 2010
  • We propose a performance analysis of code division multiple access systems based on the combination of M-ary and pseudo-noise spreading. In spite of the total bandwidth expansion being equal, there is a difference in the system performance by the combination of M-ary and pseudo-noise spreading. The proposed analysis uses each bandwidth expansion, caused by M-ary and pseudo-noise spreading, rather than the total bandwidth expansion. If the signal to interference plus noise ratio becomes high, it is more effective to reduce biterror rate by bandwidth expansion of M-ary modulation rather than that of pseudo-noise spreading. Since the proposed analysis reflects the effect of the M-ary modulation, the bit error rate from the proposed analysis is closer to the results of the simulation than from the conventional analysis.

A Combined Pseudo-random Noise Signal Based Advanced Region Correlation Scheme for BOC(pn,n) Modulated GNSS Signals in Repeat-back Jamming Environment (재방송 재밍 환경에서 BOC(pn,n) GNSS 변조된 신호를 위한 CP-ARC 기법)

  • Yoo, Seungsoo;Yeom, Dong-Jin;Jee, Gyu-In;Kim, Sun Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.11
    • /
    • pp.977-983
    • /
    • 2016
  • This paper proposes a novel code-tracking scheme to track the fine code synchronization for BOC (pn,n)-modulated global navigation satellite system signals in a repeat-back jamming environment. The correlation function of BOC (pn,n)-modulated signals has several peaks. The correlation function in the advanced offset region remains almost unchanged due to the repeat-back signals being received later than a line-of-sight signal in the same multipath signal receiving case. Additionally, the combined pseudo-random noise signal can be treated as repeat-back jamming signals, like multipath signals. In this paper, we propose a novel code-tracking scheme utilizing the advantages of using a combined pseudo-random noise signal in the advanced offset region and verify its performance through simulation.

Image Encryption using Cellular Automata Sequence with Two Maximum Cycle (두 개의 최대 주기를 갖는 셀룰라 오토마타 수열을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1201-1208
    • /
    • 2010
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. hen we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operation of the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

Image Encryption using 90/150 NBCA structure (90/150 NBCA 구조를 이용한 영상 암호화)

  • Nam, Tae-Hee;Kim, Seok-Tae;Cho, Sung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.152-155
    • /
    • 2009
  • In this paper, we propose the image encryption method using complemented MLCA based on 90/150 NBCA(Null Boundary Cellular Automata). The encryption method is processed in the following order. First, complemented MLCA, which is derived from linear LFSR, is used to produce a PN(pseudo noise) sequence, which matches the size of the original image. Then, the created complemented MLCA sequence goes through a XOR operation with the original image to become encrypted. Lastly, an experiment is processed to verify the effectiveness of this method.

  • PDF

Image Encryption Using Two Linear MLCA (두 개의 선형 MLCA을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.953-955
    • /
    • 2009
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. Then we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operating the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

  • PDF

Synchronization Scheme Using Phase Offsets of PN Sequences (PN 부호의 위상오프셋을 이용한 동기 방법)

  • Song, Young-Joon;Han, Young-Yearl
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2003.11a
    • /
    • pp.581-584
    • /
    • 2003
  • It is important to know phase offsets of PN (Pseudo Noise) sequences in spread spectrum communications since the acquisition is equivalent to make a phase offset between a receiving PN sequence and a PN sequence of local PN generator be identical. In this paper, a phase offset enumeration method for PN sequences with error detection, and its application to the synchronization are proposed. The phase offset enumeration far an n-tuple PN sequence and its error detection are performed when one period of the sequence is received. Once the phase offset of the receiving sequence is calculated, we can easily accomplish the synchronization by initializing shift registers of a local PN generator according to the phase offset value. The mean acquisition time of the proposed synchronization method is derived analytically, and we see that the method acquires very fast acquisition in the high SNR (Signal-to- Noise Ratio) environment.

  • PDF

PN Code Algorithm for Improving Interference Cancellation of Multiple Access (PN 부호 알고리즘의 개선을 통한 사용자간 다원접속간섭 제거에 관한 연구)

  • Kim, Na-Young;Kim, Ji-Hee;Choi, Seong-Min;Son, Dong-Cheul;Kim, Hee-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3053-3059
    • /
    • 2010
  • In DS-CDMA method, Mobile Stations own jointly one radio channel and are made to use a PN code (Pseudo-Noise Code) for the purpose of minimize interference. However, corelation value of PN code is one when time delay is zero but the corelation value is 1 / N when time delay is not 0. Therefore corelation characteristic does not fully attained. As a result, when the user increase, the performance degradation and system capacity problem will be able to occur by interference among users. In this paper, the PN code has ideally self corelation. It was proved that PN code could depress interference from other users in multiple access system.

Image Encryption using Non-linear FSR and 2D CAT (벼선형 FSR과 2D CAT을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7C
    • /
    • pp.663-670
    • /
    • 2009
  • In this paper, we propose the image encryption method which gradually uses NFSR(Non-linear Feedback Shift Register) and 20 CAT(Two-Dimensional Cellular Automata Transform). The encryption method is processed in the following order. First, NFSR is used to create a PN(pseudo noise) sequence, which matches the size of the original image. Then, the created sequence goes through a XOR operation with the original image and process the encipherment. Next, the gateway value is set to produce a 20 CAT basis function. The produced basis function is multiplied by encryption image that has been converted to process the 20 CAT encipherment. Lastly, the results of the experiment which are key space analysis, entropy analysis, and sensitivity analysis verify that the proposed method is efficient and very secure.