• Title/Summary/Keyword: electronic communications

Search Result 1,394, Processing Time 0.031 seconds

A New Adaptive Kernel Estimation Method for Correntropy Equalizers (코렌트로피 이퀄라이져를 위한 새로운 커널 사이즈 적응 추정 방법)

  • Kim, Namyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.627-632
    • /
    • 2021
  • ITL (information-theoretic learning) has been applied successfully to adaptive signal processing and machine learning applications, but there are difficulties in deciding the kernel size, which has a great impact on the system performance. The correntropy algorithm, one of the ITL methods, has superior properties of impulsive-noise robustness and channel-distortion compensation. On the other hand, it is also sensitive to the kernel sizes that can lead to system instability. In this paper, considering the sensitivity of the kernel size cubed in the denominator of the cost function slope, a new adaptive kernel estimation method using the rate of change in error power in respect to the kernel size variation is proposed for the correntropy algorithm. In a distortion-compensation experiment for impulsive-noise and multipath-distorted channel, the performance of the proposed kernel-adjusted correntropy algorithm was examined. The proposed method shows a two times faster convergence speed than the conventional algorithm with a fixed kernel size. In addition, the proposed algorithm converged appropriately for kernel sizes ranging from 2.0 to 6.0. Hence, the proposed method has a wide acceptable margin of initial kernel sizes.

A Study on the Analysis of Electromagnetic Characteristics and Design of a Cylindrical Photonic Crystal Waveguide with a Low-Index Core (중심-동공을 갖는 원통형태 광결정 도파로의 전자장 특성 분석 및 설계 연구)

  • Kim, Jeong I.
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.29-34
    • /
    • 2021
  • In this paper, a cylindrical photonic crystal waveguide with a low-index core is first proposed. The core can be filled with air, liquid, or arbitrary dielectric materials. Exact analyses for the electromagnetic field characteristics of guided modes, by using appropriate Bessel functions and applying the boundary conditions, are performed to find out the guiding characteristics of the proposed waveguide. For verification and usage in design and manufacturing process, the computer-calculation of the waveguide transmission characteristics is also performed by applying the rigorous full-vectorial finite difference method. Providing variations of the effective area for the fundamental mode of the designed waveguide with different numbers of cladding layers, ranging from 2.6056 ㎛2 to 5.9673 ㎛2 over the operation wavelength, generally as the core refractive index n1 is higher, the mode area becomes smaller and the result leads to more optimistic effect for nonlinear device applications.

Review of OLED-based Wearable Display for Smart Textiles (스마트 텍스타일 구현을 위한 OLED 기반 웨어러블 디스플레이 리뷰)

  • Jeong, Eun Gyo;Lee, Chang-Min;Cho, Seok Ho
    • Fashion & Textile Research Journal
    • /
    • v.23 no.6
    • /
    • pp.860-868
    • /
    • 2021
  • Clothing has a very important role in human life, and it is the most human-friendly platform because humans wear it in almost all the time. In the recent years, smart clothing integrated with various functions is solidifying its position as the core of next-generation Information and Communications Technology(ICT). With this global trend, the smart textiles, textiles embedded with electronic devices that are capable of performing various functions, have been attracting a lot of attention. Therefore, various research activities on the smart textiles are in progress, and the global market outlook for the smart textiles is also showing rapid growth. Among the various smart textile technologies, the textile/fiber-based wearable display has been attracting more attention because it is an essential element for wearers to intuitively control the functions integrated in the smart textiles. This paper provides insightful information and the technological elements of organic light emitting diodes(OLEDs) display, which have been evaluated as the most ideal device for luminescent clothing. Since, OLEDs have many advantages such as light weight, extremely thin thickness and great flexibility, the textile/fiber-based wearable OLEDs can be worn without any inconvenience. In addition, by introducing previous studies on the textile/fiber-based OLED displays, we intend to consider the commercial potential of the textile/fiber-based smart luminescent clothing using the OLED technologies.

The Effect of Influencer Information Source, Message Sidedness, Consumer Regulatory Focus on E-WOM Intentions about the Cosmetics Advertisements of Instagram (인플루언서 정보원천, 메시지 측면성, 소비자 조절초점이 인스타그램 화장품광고 온라인 구전의도에 미치는 효과)

  • Lim, Se-Won;Han, Sang-In;Hwang, Sun-Jin
    • Journal of Fashion Business
    • /
    • v.25 no.5
    • /
    • pp.149-162
    • /
    • 2021
  • Nowadays, the cosmetic and fashion industries are paying attention to influencer marketing on Instagram. In this study, we determined whether electronic word of mouth (e-WOM) communications were affected by the following parameters: the influencer's information source, message sidedness, and consumer's regulatory focus. The experimental design of this study is a three-way mixed ANOVA, which comprises of 2 (influencer information source: expert vs general consumer) × 2 (message sidedness: two-sided message vs one-sided message) × 2 (consumer regulatory focus: promotion focus vs prevention focus) structure. The data for this research study was obtained by distributing a questionnaire to 410 subjects. The participants were aged between 20 and 39 years and lived in Seoul and Gyeonggi areas. In total, the data of 396 subjects was analyzed with the help of SPSS 25.0 statistical program: frequency analysis, reliability analysis, t-test, three-way ANOVA, and simple main effect analysis were performed. The analysis results were as follows: First, influencer information sources and consumer regulatory focus exhibited a significant interaction with consumers' e-WOM intentions. Second, message sidedness and consumer's regulatory focus exhibited a significant interaction with e-WOM intentions. Third, influencer information source and message sidedness exhibited a significant interaction with consumers' e-WOM intentions. Based on these findings, the type of influencer's information source and the consumer's regulatory focus was taken into consideration while marketing cosmetics on Instagram. Moreover, influencer marketing strategies must be used to evaluate message sidedness. This would help us gauge the consumer's attitude towards advertisements.

Analysis and Improvement Specific Frequency Reception Noise Phenomena Due to RF Radiation Signal (RF 방사 신호로 인한 특정 주파수 수신 잡음 현상의 원인분석 및 개선)

  • Kwon, Jung-Hyuk;Kim, Jong-Min;Lee, Wang-Sang
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.3
    • /
    • pp.73-83
    • /
    • 2022
  • The purpose of this paper was to identify a method to improve received noise in a specific frequency band, caused by RF radiation signals during aircraft operation. The communication equipment of the aircraft is critical to the performance and safety of the flight mission, as it is responsible for the function of internal and external communications. Noise-free, clean communication quality, as well as transmission and receiving functions have to be implemented. Thus, the cause analysis of the reception noise in a specific frequency band, was analyzed through trouble shooting. The receiving noise due to the RF radiation signal emitted from the subsystem unit inside the aircraft, was improved by shielding with a CAP with electroless nickel plating applied. Additionally, the measurement and verification results of the improvement method are also described.

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

OFDM based mimicking dolphin whistle for covert underwater communications (OFDM 기반 돌고래 휘슬음 모방 수중 은밀 통신 기법)

  • Lee, Hojun;Ahn, Jongmin;Kim, Yongcheol;Seol, Seunghwan;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.3
    • /
    • pp.219-227
    • /
    • 2021
  • This paper proposed an Orthogonal Frequency Division Multiplexing (OFDM) based biomimetic communication method using a dolphin whistle which covertly transmits communication signals to allies. The proposed method divides the dolphin whistle into several time slots corresponding to a number of OFDM symbols, and modulates the communication signal by mapping differential phase shift keying (DPSK) symbols into subcarriers that have the frequency bands of the dolphin whistle in each slot. The advantages of the proposed method are as follows: In the conventional Chirp Spread Spectrum (CSS) and Frequency Shift Keying (FSK) based biomimetic communication methods, the discontinuity of the frequency contour is large, but the proposed method can reduce the discontinuity. Even if the modulation order is increased, the degradation of the mimicking performance is small. The computer simulations demonstrate that the Bit Error Rate (BER) and mimicking performance of the proposed method are better performance than those of the conventional CSS and FSK.

Time Domain Response of Random Electromagnetic Signals for Electromagnetic Topology Analysis Technique

  • Han, Jung-hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.135-144
    • /
    • 2022
  • Electromagnetic topology (EMT) technique is a method to analyze each component of the electromagnetic propagation environment and combine them in the form of a network in order to effectively model the complex propagation environment. In a typical commercial communication channel model, since the propagation environment is complex and difficult to predict, a probabilistic propagation channel model that utilizes an average solution, although with low accuracy, is used. However, modeling techniques using EMT technique are considered for application of propagation and coupling analysis of threat electromagnetic waves such as electromagnetic pulses, radio wave models used in electronic warfare, local communication channel models used in 5G and 6G communications that require relatively high accuracy electromagnetic wave propagation characteristics. This paper describes the effective implementation method, algorithm, and program implementation of the electromagnetic topology (EMT) method analyzed in the frequency domain. Also, a method of deriving a response in the time domain to an arbitrary applied signal source with respect to the EMT analysis result in the frequency domain will be discussed.

Research trends of biomimetic covert underwater acoustic communication (생체모방 은밀 수중 음향 통신 연구 동향)

  • Seol, Seunghwan;Lee, Hojun;Kim, Yongcheol;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.227-234
    • /
    • 2022
  • Covert Underwater Communication (CUC) signals should not be detected by other unintended users. Similar to the method used in Radio Frequency (RF), covert communication technique sending information underwater is designed in consideration of the characteristics of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI). These conventional methods, however, are difficult to be used in the underwater communications because of the narrow frequency bandwidth. Unlike the conventional methods of reducing transmission power or increasing the modulation bandwidth, a method of mimicking the acoustic signal of an underwater mammal is being studied. The biomimetic underwater acoustic communication mainly mimics the click or whistle sound produced by dolphin or whale. This paper investigates biomimetic communication method and introduces research trends to understand the potential for the development of such biomimetic covert underwater acoustic communication and future research areas.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.