• 제목/요약/키워드: pseudo-binary

검색결과 112건 처리시간 0.02초

Self-Encoded Spread Spectrum with Iterative Detection under Pulsed-Noise Jamming

  • Duraisamy, Poomathi;Nguyen, Lim
    • Journal of Communications and Networks
    • /
    • 제15권3호
    • /
    • pp.276-282
    • /
    • 2013
  • Self-encoded spread spectrum (SESS) is a novel modulation technique that acquires its spreading code from a random information source, rather than using the traditional pseudo-random noise (PN) codes. In this paper, we present our study of the SESS system performance under pulsed-noise jamming and show that iterative detection can significantly improve the bit error rate (BER) performance. The jamming performance of the SESS with correlation detection is verified to be similar to that of the conventional direct sequence spread spectrum (DSSS) system. On the other hand, the time diversity detection of the SESS can completely mitigate the effect of jamming by exploiting the inherent temporal diversity of the SESS system. Furthermore, iterative detection with multiple iterations can not only eliminate the jamming completely but also achieve a gain of approximately 1 dB at $10^{-3}$ BER as compared with the binary phase shift keying (BPSK) system under additive white gaussian noise (AWGN) by effectively combining the correlation and time diversity detections.

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • 제2권1호
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

상관도 기반의 강인한 블라인드 워터마킹 (Correlation-based Robust Blind Watermarking)

  • 주상현;서용석
    • 정보처리학회논문지B
    • /
    • 제10B권5호
    • /
    • pp.479-484
    • /
    • 2003
  • 대부분의 워터마킹 기법은 공격에 대한 강인성과 비가시성을 통시에 만족시키기 위하여 중간주파수 영역에 워터마크를 삽입하는데 반해, 본 논문에서는 웨이블릿 분해된 영상의 저주파영역에 워터마크열, (-1, +1), 을 비가시적으로 삽입하는 블라인드 워터마킹 기법을 소개한다. 워터마크를 삽입하는 위치는 키에 의해 랜덤하게 선택되며, 화진열화를 크게 일으키는 계수에 대해서는 워터마크 삽입을 생략한다. 본 방식은 추출된 비터마크열의 상관도 계산에 의해 워터마크의 유무를 판정하므로 워터마크열의 일부가 삽입되지 않더라도 워터마크의 판정에는 무리가 없음을 보인다. 제안하는 방식의 성능은 ChechMark [1]의 벤치마킹 툴을 통하여 검증하였으며 [1]에 등록되어 있는 다른 방식들과 비교하였다.

CDMA 시스팀에서의 PN 부호 시간차 측정 기법 (Analysis for Time Offset of PN Sequence in CDMA System)

  • 전정식;한영열
    • 한국통신학회논문지
    • /
    • 제19권5호
    • /
    • pp.971-980
    • /
    • 1994
  • 현존하는 셀룰라 이동통신의 가입자 수용 한계로 부호분할다원접속(CDMA) 방식을 사용하는 디지틀셀룰라 통신 방식이 거론되고 있다. EIA/TIA 잠정 표준안인 CDMA 시스팀에서는 동일한 확살부호를 전체 시스팀에 사용하지만 각 기지국에 확산부호의 위상옵셉(phase-offset)을 다르게 배분함으로써 이동국은 기지국으로 송신된 신호를 구변하도록 하고 있다. 그러나 확산부호의 위상옵셉이 기준이 되는 영옵셉(zero-offset) 부호를 임의로 설정하고 있다. 본 논문은 확산부호의 기준 부호를 정하는 방법을 제시하고, 기준 부호로부터 위상을 이전(shift) 시킨 부호 사이의 위상옵셉을 쉽게 계산하는 방법을 제시한다.

  • PDF

코드분할 다중방식을 기반으로 하는 선박 상태 모니터링 광섬유 센서 네트워크 (Fiber Sensor Network for Vessel Monitoring based on Code Division Multiple Access)

  • 김영복;이성로;전시욱;박창수
    • 한국통신학회논문지
    • /
    • 제36권10B호
    • /
    • pp.1216-1221
    • /
    • 2011
  • 본 논문은 코드 분할 다중방식을 이용하여 외부로부터 선박에 가해지는 변형 및 온도 변화를 모니터링 할 수 있는 광섬유 브라그 격자 (FBG) 기반의 센서 네트워크를 제안하였다. 선박에 변형이 발생 하거나 온도의 변화가 일어날 때 FBG는 본래 가지고 있는 중심 파장이 이동하며 이는 외부 변형 크기에 비례하여 증가된다. 중심파장의 변화량을 측정함으로써 센서에 가해지는 변형이나 온도의 크기를 알 수 있다. 제안된 센서 네트워크는 코드분할 다중방식을 이용하였으며 광원에서 발생되는 신호를 직접 변조하여, 변조된 신호를 센서로 보내고 센서로부터 돌아오는 신호를 검출하여 상태를 모니터링하게 된다. 또한 슬라이딩 자기상관 기법과, 파장-시간 변환 기법을 이용하여 빠른 센싱과 넓은 범위의 센싱이 가능하도록 하였다.

Identification of the Mechanical Resonances of Electrical Drives for Automatic Commissioning

  • Pacas Mario;Villwock Sebastian;Eutebach Thomas
    • Journal of Power Electronics
    • /
    • 제5권3호
    • /
    • pp.198-205
    • /
    • 2005
  • The mechanical system of a drive can often be modeled as a two- or three-mass-system. The load is coupled to the driving motor by a shaft able to perform torsion oscillations. For the automatic tuning of the control, it is necessary to know the mathematical description of the system and the corresponding parameters. As the manpower and setup-time necessary during the commissioning of electrical drives are major cost factors, the development of self-operating identification strategies is a task worth pursuing. This paper presents an identification method which can be utilized for the assisted commissioning of electrical drives. The shaft assembly can be approximated as a two-mass non-rigid mechanical system with four parameters that have to be identified. The mathematical background for an identification procedure is developed and some important implementation issues are addressed. In order to avoid the excitation of the system with its natural resonance frequency, the frequency response can be obtained by exciting the system with a Pseudo Random Binary Signal (PRBS) and using the cross correlation function (CCF) and the auto correlation function (ACF). The reference torque is used as stimulation and the response is the mechanical speed. To determine the parameters, especially in advanced control schemes, a numerical algorithm with excellent convergence characteristics has also been used that can be implemented together with the proposed measurement procedure in order to assist the drive commissioning or to achieve an automatic setting of the control parameters. Simulations and experiments validate the efficiency and reliability of the identification procedure.

OPKFDD를 이용한 불리안 함수 표현의 최적화 (An Optimization of Representation of Boolean Functions Using OPKFDD)

  • 정미경;이혁;이귀상
    • 한국정보처리학회논문지
    • /
    • 제6권3호
    • /
    • pp.781-791
    • /
    • 1999
  • DD(Decision Diagrams) is an efficient operational data structure for an optimal expression of boolean functions. In a graph-based synthesis using DD, the goal of optimization decreases representation space for boolean functions. This paper represents boolean functions using OPKFDD(Ordered Pseudo-Kronecker Functional Decision Diagrams) for a graph-based synthesis and is based on the number of nodes as the criterion of DD size. For a property of OPKFDD that is able to select one of different decomposition types for each node, OPKFDD is variable in its size by the decomposition types selection of each node and input variable order. This paper proposes a method for generating OPKFDD efficiently from the current BDD(Binary Decision Diagram) Data structure and an algorithm for minimizing one. In the multiple output functions, the relations of each function affect the number of nodes of OPKFDD. Therefore this paper proposes a method to decide the input variable order considering the above cases. Experimental results of comparing with the current representation methods and the reordering methods for deciding input variable order are shown.

  • PDF

Influence of neutron irradiation and ageing on behavior of SAV-1 reactor alloy

  • Tsay, K.V.;Rofman, O.V.;Kudryashov, V.V.;Yarovchuk, A.V.;Maksimkin, O.P.
    • Nuclear Engineering and Technology
    • /
    • 제53권10호
    • /
    • pp.3398-3405
    • /
    • 2021
  • This study observed the effect of neutron irradiation and ageing on the microstructure, hardness, and corrosion resistance of SAV-1 (Al-Mg-Si) alloy. The investigated material was irradiated with neutrons to fluences of 1021-1026 n/m2 in the WWR-K research reactor and kept in dry storage. Long-term irradiation led to an increase in hardness of the alloy and a deterioration of pitting corrosion resistance. Post-irradiation ageing for 1 h at 100-300 ℃ resulted in a decrease in microhardness of the irradiated SAV-1. The effect of post-irradiation ageing on pitting corrosion was made clear through the formation of Guinier-Preston zones and secondary precipitates in the Al matrix. Ageing at 250 ℃ corresponded to the development of stable microstructure and the highest corrosion resistance for the irradiated samples. Mg2Si, Si, and needle-shaped β" precipitates were formed in SAV-1 alloy that was irradiated with low fluences. β" and clusters of rod-shaped B-type precipitates were observed in highly irradiated samples. The precipitates were similar to those seen in non-irradiated pseudo-binary Al-Mg2Si alloys with Si excess.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

Al-Si-Mg-Cu 합금계의 열간 균열 특성 평가방법에 관한 연구 (Evaluation of Hot Tear Susceptibility of Al-Si-Mg-Cu Alloy System)

  • 손광석;박태은;김진수;강성민;김동규
    • 대한금속재료학회지
    • /
    • 제48권5호
    • /
    • pp.436-444
    • /
    • 2010
  • The hot tear susceptibility of Al alloys was investigated by using a constrained-rod mold designed to quantify 8 types of tear tendency. The severity of the crack was scored by 5 grades on a scale of 0 to 4, with 0 being "no crack formed" and 4 being "complete separation by crack". The Hot Tear Susceptibility index (HTS) which consists of crack type scores and position scores, was proposed to compare the hot tear tendency of Al alloys. A356.0 cast alloy and AA6061 wrought Al alloy showed an HTS value of 27.5 and 53 respectively. The effects of Si, Cu, and Mg content on hot tear tendency were also investigated with a constrained-rod mold. The variation of HTS values with alloying elements represents similar behavior in the variation of the solidification range in a pseudo binary phase diagram.