• Title/Summary/Keyword: error message

Search Result 232, Processing Time 0.024 seconds

Exact Bit Error Probability of Orthogonal Space-Time Block Codes with Quadrature Amplitude Modulation

  • Kim, Sang-Hyo;Yang, Jae-Dong;No, Jong-Seon
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.253-257
    • /
    • 2008
  • In this paper, the performance of generic orthogonal space-time block codes (OSTBCs) introduced by Alamouti [2], Tarokh [3], and Su and Xia [11] is analyzed. We first define one-dimensional component symbol error function (ODSEF) from the exact expression of the pairwise error probability of an OSTBC. Utilizing the ODSEF and the bit error probability (BEP) expression for quadrature amplitude modulation (QAM) introduced by Cho and Yoon [9], the exact closed-form expressions for the BEP of linear OSTBCs with QAM in quasi-static Rayleigh fading channel are derived. We also derive the exact closed-form of the BEP for some OSTBCs which have at least one message symbol transmitted with unequal power via all transmit antennas.

New Message-Passing Decoding Algorithm of LDPC Codes by Partitioning Check Nodes (체크 노드 분할에 의한 LDPC 부호의 새로운 메시지 전달 복호 알고리즘)

  • Kim Sung-Hwan;Jang Min-Ho;No Jong-Seon;Hong Song-Nam;Shin Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.310-317
    • /
    • 2006
  • In this paper, we propose a new sequential message-passing decoding algorithm of low-density parity-check (LDPC) codes by partitioning check nodes. This new decoding algorithm shows better bit error rate(BER) performance than that of the conventional message-passing decoding algorithm, especially for small number of iterations. Analytical results tell us that as the number of partitioned subsets of check nodes increases, the BER performance becomes better. We also derive the recursive equations for mean values of messages at variable nodes by using density evolution with Gaussian approximation. Simulation results also confirm the analytical results.

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss

  • Baek, Jin-Suk;Paris, Jehan-Francois
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.82-102
    • /
    • 2008
  • Packet losses tend to occur during short error bursts separated by long periods of relatively error-free transmission. There is also a significant spatial correlation in loss among the receiver nodes in a multicast session. To recover packet transmission errors at the transport layer, tree-based protocols construct a logical tree for error recovery before data transmission is started. The current tree construction scheme does not scale well because it overloads the sender node. We propose a scalable recovery tree construction scheme considering these properties. Unlike the existing tree construction schemes, our scheme distributes some tasks normally handled by the sender node to specific nodes acting as repair node distributors. It also allows receiver nodes to adaptively re-select their repair node when they experience unacceptable error recovery delay. Simulation results show that our scheme constructs the logical tree with reduced message and time overhead. Our analysis also indicates that it provides fast error recovery, since it can reduce the number of additional retransmissions from its upstream repair nodes or sender node.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Development of Efficient Conservative Algorithm for Distributed Simulation (분산 시뮬레이션을 위한 효율적인 보수적 알고리즘 개발)

  • 이영해
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.1
    • /
    • pp.77-88
    • /
    • 1999
  • There are two approaches to handle the Causality Error in parallel and distributed simulation. One approach is based on the conservative time synchronization and the other is the optimistic time synchronization. In this paper an efficient null message reduction method for the conservative time synchronization approach is suggested with the experimental results, which could improve performance of simulation and avoid deadlock situations.

  • PDF

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels

  • Kim, Kyung-Su;Lee, Hae-Yeoun;Lee, Heung-Kyu
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.168-173
    • /
    • 2010
  • Error concealment techniques are significant due to the growing interest in imagery transmission over error-prone channels. This paper presents a spatial error concealment technique for losslessly compressed images using least significant bit (LSB)-based data hiding to reconstruct a close approximation after the loss of image blocks during image transmission. Before transmission, block description information (BDI) is generated by applying quantization following discrete wavelet transform. This is then embedded into the LSB plane of the original image itself at the encoder. At the decoder, this BDI is used to conceal blocks that may have been dropped during the transmission. Although the original image is modified slightly by the message embedding process, no perceptible artifacts are introduced and the visual quality is sufficient for analysis and diagnosis. In comparisons with previous methods at various loss rates, the proposed technique is shown to be promising due to its good performance in the case of a loss of isolated and continuous blocks.

Multipath Error Analysis and Scenario Generation for Verifying KRS Environment

  • Cho, Sunglyong;Choi, Heonho;Lee, Byungseok;Nam, Giwook
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.2
    • /
    • pp.71-77
    • /
    • 2020
  • KRS which is subsystem of Korea Augmentation Satellite System (KASS) performs a role of collecting and monitoring GPS signals. In order to generate the accurate correction message, the site which meets the requirements should be selected and verification to meet each requirement should be accompanied. When the sites are selected, the environmental considerations are EMI, clear horizon (CH) and multipath. Of these, EMI and CH can be checked for satisfaction by instrumentation, but multipath error is difficult to predict. Therefore, multipath error analysis for the installation position of actual antenna at each KRS site should be preceded, and multipath scenario should be generated for each location to analyze the effects of the resulting system performance. In this paper, based on satellite signals collected from each KRS sites, the method for analyzing multipath error in each KRS sites is described, and the multipath error is analyzed. Also to perform an analysis of the effects on system performance due to multipath error, multipath error modeling is performed for the generation of simulation scenarios.