• Title/Summary/Keyword: convolution code

Search Result 67, Processing Time 0.022 seconds

Performance of COFDM in Underwater Acoustic Channel with Frequency Selective Fading (주파수 선택적 페이딩을 갖는 수중 음향 채널에서 COFDM의 성능)

  • Seo, Chulwon;Park, Jihyun;Park, Kyu-Chil;Yoon, Jong Rak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.5
    • /
    • pp.377-384
    • /
    • 2013
  • In this paper, performance of COFDM (Coded Orthogonal Frequency Division Multiplexing) which is OFDM with a forward error correction code, is studied in frequency selective fading underwater acoustic communication channel. The OFDM is a multiplexing technique resistant to frequency selective multipath channel. In OFDM, a broadband information signal is transformed into several narrow band signals and transmits narrow band signals whose bandwidths are less than the channel coherence bandwidth. However, its performance is degraded in a specific narrow band signal due to its deep fading by multipath. To mitigate this degradation, COFDM which is OFDM with convolution code as a forward error correction code, is evaluated. The performance of COFDM is found to be better than that of OFDM in multipath channel.

Interleaving for Viterbi Decoding in the Rayleigh Fading Channel (레일리 페이딩 채널에서의 Viterbi 복호를 위한 인터리빙)

  • 이상곤;전중인;문상재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.12
    • /
    • pp.963-972
    • /
    • 1990
  • Burst errors is a major cause of the performance degradation of digital mobile radio communication over the Rayleigh fading channel. Convoluational codes with block interleaving can be employed to reduce the degredation. This paper has studied the randomness of errors and applied the interleaving to the Viterbi decoders of convolutional codes, Good interleavers for the r=3/4, L=7 convolution code has been searched through computer simulation.

  • PDF

Implementation of Binary Search Algorithm for RFID system and A Study of Performance with RFID system (RFID용 이진 검색 알고리즘의 구현 및 시스템 성능에 관한 연구)

  • Cho, Kyung-Chul;Son, Sung-Chan;Kim, Young-Cheol
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.285-289
    • /
    • 2005
  • In recent years, RFID is widely used in industrial applications including factory, material flow, logistics and defense areas. In this paper, we developed a RFID baseband system with ASK modulation and convolutional channel code. A commercial ASK RF module is used its frequency range in $350{\sim}351$MHz and power is 10mW and the convolution code is constraint length k=3 and rate R=1/2 The performance is measured implemented the binary search algorithm as anti-collision method and we show the wave shapes whit collision occurrence.

  • PDF

Photon dose calculation of pencil beam kernel based treatment planning system compared to the Monte Carlo simulation

  • Cheong, Kwang-Ho;Suh, Tae-Suk;Kim, Hoi-Nam;Lee, Hyoung-Koo;Choe, Bo-Young;Yoon, Sei-Chul
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.291-293
    • /
    • 2002
  • Accurate dose calculation in radiation treatment planning is most important for successful treatment. Since human body is composed of various materials and not an ideal shape, it is not easy to calculate the accurate effective dose in the patients. Many methods have been proposed to solve the inhomogeneity and surface contour problems. Monte Carlo simulations are regarded as the most accurate method, but it is not appropriate for routine planning because it takes so much time. Pencil beam kernel based convolution/superposition methods were also proposed to correct those effects. Nowadays, many commercial treatment planning systems, including Pinnacle and Helax-TMS, have adopted this algorithm as a dose calculation engine. The purpose of this study is to verify the accuracy of the dose calculated from pencil beam kernel based treatment planning system Helax-TMS comparing to Monte Carlo simulations and measurements especially in inhomogeneous region. Home-made inhomogeneous phantom, Helax-TMS ver. 6.0 and Monte Carlo code BEAMnrc and DOSXYZnrc were used in this study. Dose calculation results from TPS and Monte Carlo simulation were verified by measurements. In homogeneous media, the accuracy was acceptable but in inhomogeneous media, the errors were more significant.

  • PDF

A study for chirp signal method & system implementation in the PLC modem with low speed (저속 PLC 모뎀에서의 Chirp 신호 방식과 시스템 구현에 관한 연구)

  • Jeong, Young-Hwa;Sang-Gun Lee
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.37-45
    • /
    • 2004
  • The representative communication method which is applied in the low-speed power line communication modem with 60bps is single carrier method. It has been used mainly for the control. The single carrier method is very sensitive to a power line communication channel environment. Specially, the severe attenuation of the transmission signal according to the notch characteristics of channel becomes the main cause of communication error. Domestic power line channel environment has this notable feature. In this paper, we implemented the low-speed power line communication system which used the chirp signal method to be strong in notch and noise characteristics. In this research, we proposed the method which transmits 1- '1 Unit symbol Chirp signal' with a 100${\mu}s$ time within 1ms for 1 bit. Also it applied for the Convolution code for an error correction and the Manchester code for a collision perception and an error detection. It used the method which uses the bit correlator for signal detection in the receiver parts. We confirmed that the communication method of the chirp method has a excellent performance compared to single carrier methods with a result of experiment of the low-speed power line communication system with the 60bps.

  • PDF

A study of detector size effect using Monte Carlo simulation

  • Park, Kwang-Yl;Yi, Byong-Yong;Vahc, Young W.
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2004.11a
    • /
    • pp.36-38
    • /
    • 2004
  • The detector size effect due to the spatial response of defectors is one critical source of inaccuracy in clinical dosimetry and has been a subject of numerous studies. Conventionally, the detector response kernel contains all of the influence that the detector size has on the measured beam profile. Various analytic models for this kernel have been proposed and studied in theoretical and experimental works. Here, we use a method to determine detector response kernel simply by using Monte Carlo simulation and convolution theory. Based on this numerical method and DOSIMETER, an EGS4 Monte Carlo code, the detector response for a Farmer type ion chamber embedded in water phantom is obtained. There exists characteristic difference in the simulated chamber readings between one with carbon graphite wall and the other with Acrylic wail. Using the obtained response and the convolution theory, we are planning to derive the detector response kernel numerically and remove detector size effect from measurements for 6MV, 10${\times}$l0cm2 and 0.5${\times}$10 cm2 photon beam.

  • PDF

Comparison of Film Measurements, Convolution$^{}$erposition Model and Monte Carlo Simulations for Small fields in Heterogeneous Phantoms (비균질 팬텀에서 소조사면에 대한 필름측정, 회선/중첩 모델과 몬테 카를로 모사의 비교 연구)

  • 김상노;제이슨손;서태석
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.2
    • /
    • pp.89-95
    • /
    • 2004
  • Intensity-modulated radiation therapy (IMRT) often uses small beam segments. The heterogeneity effect is well known for relatively large field sizes used in the conventional radiation treatments. However, this effect is not known in small fields such as the beamlets used in IMRT. There are many factors that can cause errors in the small field i.e. electronic disequilibrium and multiple electron scattering. This study prepared geometrically regular heterogeneous phantoms, and compared the measurements with the calculations using the Convolution/Superposition algorithm and Monte Carlo method for small beams. This study used the BEAM00/EGS4 code to simulate the head of a Varian 2300C/D. The commissioning of a 6MV photon beam were performed from two points of view, the beam profiles and depth doses. The calculated voxel size was 1${\times}$1${\times}$2$\textrm{cm}^2$ with field sizes of 1${\times}$1$\textrm{cm}^2$, 2${\times}$2$\textrm{cm}^2$, and 5${\times}$5$\textrm{cm}^2$. The XiOTM TPS (Treatment Planning System) was used for the calculation using the Convolution/Superposition algorithm. The 6MV photon beam was irradiated to homogeneous (water equivalent) and heterogeneous phantoms (water equivalent + air cavity, water equivalent + bone equivalent). The beam profiles were well matched within :t1 mm and the depth doses were within ${\pm}$2%. In conclusion, the dose calculations of the Convolution/Superposition and Monte Carlo simulations showed good agreement with the film measurements in the small field.

Multipath Fading Channel Characterization and Performances of Forward Error Correction Codes in Very Shallow Water (극 천해 다중경로 페이딩 채널 특성과 전방오류 정정 코드의 성능)

  • Bae, Minja;Xue, Dandan;Park, Jihyun;Yoon, Jong Rak
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2247-2255
    • /
    • 2015
  • In very shallow water acoustic communication channel, underwater acoustic (UWA) communication signal is observed as frequency selective fading signal due to time-varying multipath. This induces a time and frequency dependent inter-symbol-interference (ISI) and degrades the UWA system performance. There is no study about how the performances of the error correction codes are related to a multipath fading statistics in very shallow water. In this study, the characteristics of very shallow water multipath fading channel is analyzed and the performances of two different forward error correction (FEC) codes are compared. The convolution code (CC) and Reed-Solomon (RS) code are adopted. Sea experimental results show that RS code is better choice than CC in frequency selective channel with fading.

A Development of CAD Program for Metal Bellows Diaphragm (금속 벨로우즈 Diaphragm용 CAD 프로그램 개발)

  • Cho, Hae-Yong;Nam, Gi-Jung;Oh, Byung-Ki;Kim, Young-Hun;Lee, Jae-Hun;Suh, Jung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.3
    • /
    • pp.401-408
    • /
    • 2003
  • A CAD program for metal bellows diaphragm was developed in this study. This program was written in AutoLISP on the AutoCAD system with a personal computer. Basic design concept used in this program is composition of a convolution that is tangent to two lines and 5 circles from given design parameters(initial radius, inner and outer diameter, thickness, pitch, etc.). The effects of altering some design parameters on stress distribution and fatigue life of bellows were estimated using commercial FEM code, NISAII. As a result, the metal bellows diaphragm was successfully designed by the CAD program. It is used to model a bellows geometry in pre-processor of FEM code. The FEM result shows that stress is dependent on straight line length, bellows diameter with same span, and fatigue life is also affected by design parameters.

Hybrid Tensor Flow DNN and Modified Residual Network Approach for Cyber Security Threats Detection in Internet of Things

  • Alshehri, Abdulrahman Mohammed;Fenais, Mohammed Saeed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.237-245
    • /
    • 2022
  • The prominence of IoTs (Internet of Things) and exponential advancement of computer networks has resulted in massive essential applications. Recognizing various cyber-attacks or anomalies in networks and establishing effective intrusion recognition systems are becoming increasingly vital to current security. MLTs (Machine Learning Techniques) can be developed for such data-driven intelligent recognition systems. Researchers have employed a TFDNNs (Tensor Flow Deep Neural Networks) and DCNNs (Deep Convolution Neural Networks) to recognize pirated software and malwares efficiently. However, tuning the amount of neurons in multiple layers with activation functions leads to learning error rates, degrading classifier's reliability. HTFDNNs ( Hybrid tensor flow DNNs) and MRNs (Modified Residual Networks) or Resnet CNNs were presented to recognize software piracy and malwares. This study proposes HTFDNNs to identify stolen software starting with plagiarized source codes. This work uses Tokens and weights for filtering noises while focusing on token's for identifying source code thefts. DLTs (Deep learning techniques) are then used to detect plagiarized sources. Data from Google Code Jam is used for finding software piracy. MRNs visualize colour images for identifying harms in networks using IoTs. Malware samples of Maling dataset is used for tests in this work.