• Title/Summary/Keyword: code tracking

Search Result 222, Processing Time 0.03 seconds

A Novel Scheme for Code Tracking Bias Mitigation in Band-Limited Global Navigation Satellite Systems (위성 기반 측위 시스템에서의 부호 추적편이 완화 기법)

  • Yoo, Seung-Soo;Kim, Sang-Hun;Yoon, Seok-Ho;Song, Iich-Ho;Kim, Sun-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10C
    • /
    • pp.1032-1041
    • /
    • 2007
  • The global navigation satellite system (GNSS), which is the core technique for the location based service, adopts the direct sequence/spread spectrum (DS/SS) as its modulation method. The success of a DS/SS system depends on the synchronization between the received and locally generated pseudo noise (PN) signals. As a step in the synchronization process, the tacking scheme performs fine adjustment to bring the phase difference between the two PN signals to zero. The most widely used tracking scheme is the delay locked loop with early minus late discriminator (EL-DLL). In the ideal case, the EL-DLL is the best estimator among various DLL. However, in the band-limited multipath environment, the EL-DLL has tracking bias. In this paper, the timing offset range of correlation function is divided into advanced offset range (AOR) and delayed offset range (DOR) centering around the correct synchronization time point. The tracking bias results from the following two reasons: symmetry distortion between correlation values in AOR and DOR, and mismatch between the time point corresponding to the maximum correlation value and the synchronization time point. The former and latter are named as the type I and type II tracking bias, respectively. In this paper, when the receiver has finite bandwidth in the presence of multipath signals, it is shown that the type II tracking bias becomes a more dominant error factor than the type I tracking bias, and the correlation values in AOR are not almost changed. Exploiting these characteristics, we propose a novel tracking bias mitigation scheme and demonstrate that the tracking accuracy of the proposed scheme is higher than that of the conventional scheme, both in the presence and absence of noise.

A Device of Static Buffer Overflow Detection by using Function Summary and Tracking Information Flow of Buffer Domain (함수요약 및 버퍼의 도메인 정보흐름 추적에 의한 정적 버퍼넘침 탐지방안)

  • Lee, Hyung-Bong;Park, Jeong-Hyun;Park, Hyun-Mee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.703-714
    • /
    • 2001
  • In C language, a local buffer overflow in stack can destroy control information stored near the buffer. In case the buffer overflow is used maliciously to overwrite the stored return address, the system is exposed to serious security vulnerabilities. This paper analyzes the process of buffer overflow hacking and methodologies to avoid the attacks in details. And it proposes a device of static buffer overflow detection by using function summary and tracking information flow of buffer domain at assembly source code level(SASS, Static Assembly Source code Scanner) and then show the feasibility and validity of it by implementing a prototype in Pentium based Linux environment.

  • PDF

Secondary Code Determination and Signal Processing Results of GIOVE-B E5a (GIOVE-B 위성 E5a Secondary Code 결정 및 신호처리 결과)

  • Joo, In-One;Shin, Chun-Sik;Lee, Sang-Uk;Kim, Jae-Hoon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.12-19
    • /
    • 2008
  • GIOVE-B is the second experimental Galileo satellite for the Galileo In-Orbit Validation, which was launched by a Soyuz/Fregat rocket departing from the Baikonur cosmodrome in Kazakhstan on 27 April and now operated successfully. This paper presents the results obtained from processing of the E5a signal transmitted from the GIOVE-B. The acquisition and tracking of the data and pilot channels are performed by the E5a software receiver implemented by ETRI. Moreover, the paper suggests the GIOVE-B E5a-I/E5a-Q secondary code, which is determined by analyzing the correlation output of the primary correlator using the primary code.

  • PDF

GPS L5 Acquisition Schemes for Rapid Code Phase Search and Fine Doppler Determination (GPS L5 신호에서 신속한 코드위상 재검색 및 정밀 도플러 결정 기법)

  • Joo, In-One;Choi, Seung-Hyun;Kim, Jae-Hyun;Shin, Chun-Sik;Lee, Sang-Uk;Kim, Jae-Hoon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.4
    • /
    • pp.17-24
    • /
    • 2009
  • According to the GPS modernization, L5 is the third civilian GPS signal, broadcasts in a radio band reserved exclusively for aviation safety services. However, as the code length of GPS L5 is ten times longer than that of GPS L1, the acquisition processing time in GPS L5 takes longer than that of L1. This characteristics make the code phase detected initially change and cause the tracking loop to unlock. In order to overcome this problem, this paper proposes L5 acquisition schemes for the rapid code phase re-search and the fine doppler determination. The feasibility of the proposed scheme is demonstrated through the simulation results.

  • PDF

Intruder Tracking and Collision Avoidance Algorithm Design for Unmanned Aerial Vehicles using a Model-based Design Method (모델 기반 설계 기법을 이용한 무인항공기의 침입기 추적 및 충돌회피 알고리즘 설계)

  • Choi, Hyunjin;Yoo, Chang-Sun;Ryu, Hyeok;Kim, Sungwook;Ahn, Seokmin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • Unmanned Aerial Vehicles(UAVs) require collision avoidance capabilities equivalent to the capabilities of manned aircraft to enter the airspace of manned aircraft. In the case of Visual Flight Rules of manned aircraft, collision avoidance is performed by 'See-and-Avoid' of pilots. To obtain those capabilities of UAVs named as 'Sense-and-Avoid', sensor-system-based intruder tracking and collision avoidance methods are required. In this study, a multi-sensor-based tracking, data fusion, and collision avoidance algorithm is designed by using a model-based design tool MATLAB/SIMULINK, and validations of the designed model and code using numerical simulations and processor-in-the-loop simulations are performed.

Galileo BOC(1,1) Signal Tracking using GPS/Galileo Software Receiver

  • Lim, Deok-Won;Park, Chan-Sik;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.285-289
    • /
    • 2006
  • In this paper, a design and implementation of GPS/Galileo software receiver is given. As a GPS receiver, it is able to perform every function of receiver such as acquisition, code and carrier tracking, navigation bit extraction, navigation data decoding, pseudorange calculations, and position calculations. A method to acquire and track the Galileo BOC(1,1) signal is also required because the correlation of BOC(1,1) signal has multiple peaks different from that of GPS signal. Therefore, a method to detect the main-peak in correlation function of BOC signal is required to avoid false acquisition. In this paper, very-early, very late correlation is implemented to track the correct main peak. The performance of implemented GPS/Galileo software receiver with BOC(1,1) signal tracking feature is evaluated with GPS/Galileo IF signal generator.

  • PDF

Camera Tracking Method based on Model with Multiple Planes (다수의 평면을 가지는 모델기반 카메라 추적방법)

  • Lee, In-Pyo;Nam, Bo-Dam;Hong, Hyun-Ki
    • Journal of Korea Game Society
    • /
    • v.11 no.4
    • /
    • pp.143-149
    • /
    • 2011
  • This paper presents a novel camera tracking method based on model with multiple planes. The proposed algorithm detects QR code that is one of the most popular types of two-dimensional barcodes. A 3D model is imported from the detected QR code for augmented reality application. Based on the geometric property of the model, the vertices are detected and tracked using optical flow. A clipping algorithm is applied to identify each plane from model surfaces. The proposed method estimates the homography from coplanar feature correspondences, which is used to obtain the initial camera motion parameters. After deriving a linear equation from many feature points on the model and their 3D information, we employ DLT(Direct Linear Transform) to compute camera information. In the final step, the error of camera poses in every frame are minimized with local Bundle Adjustment algorithm in real-time.

Line Segments Extraction by using Chain Code Tracking of Edge Map from Aerial Images (항공영상으로부터 에지 맵의 체인코드 추적에 의한 선소추출)

  • Lee Kyu-won;Woo Dong-min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.709-713
    • /
    • 2005
  • A new algorithm is proposed for the extraction of line segments to construct 3D wire-frame models of building from the high-resolution aerial images. The purpose of this study Is the accurate and effective extraction of line segments, considering the problems such as discordance of lines and blurred edges existing in the conventional methods. Using the edge map extracted from aerial images, chain code tracking of edges was performed. Then, we extract the line segments considering the strength of edges and the direction of them. SUSAN (Smallest Uni-value Segment Assimilating Nucleus) algorithm proposed by Smith was used to extract an edge map. The proposed algorithm consists of 4 steps: removal of the horizontal, vertical and diagonal components of edges to reduce non-candidate point of line segments based on the chain code tracking of the edge map, removal of contiguous points, removal of the same angle points, and the extraction of the start and end points to be line segments. By comparing the proposed algorithm with Boldt algorithm, better results were obtained regarding the extraction of the representative line segments of buildings, having relatively less extraction of unnecessary line segments.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Digital Correlator Design for GPS/GLONASS Receiver (GPS/GLONASS 수신기용 디지털 상관기 설계)

  • 조득재;최일홍;박찬식;이상정
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.275-275
    • /
    • 2000
  • This paper designs a digital correlator for the integrated GPS/GLONASS receiver consisting of DCO, carrier cycle counter, code generator, code phase counter, mixer, epoch counter, accumulator. It is designed using Verilog-HDL(Verilog-Hardware Description Language) and synthesized using EDA(Electronic Design Automation) tools. The performance of the designed digital correlator is verified by the functional simulation and real satellite tracking experiments.

  • PDF