• Title/Summary/Keyword: 블록 모델링

Search Result 213, Processing Time 0.022 seconds

An Implementation of OFDM System Receiver Using Efficient Frequency Offset Estimation Algorithm (효율적인 주파수 옵셋 추정 알고리듬을 이용한 OFDM 시스템 수신기 구현)

  • 박광호;신경욱;전흥우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.369-372
    • /
    • 2003
  • This paper describes a design of OFDM (Orthogoanl Frequency Division Multiplexing) based wireless LAN system receiver, defined in IEEE 802.11a standards. Because OFDM system uses several orthogonal sequence sets, it ran avoid selective fading of fast data transfer problem when it is used with error correction code. But if the receiver is not synchronized, the orthogonal of between sub-ralliers will be destroyed and the data interruption will be generated. So it makes error property get worse very murk. For improving the noise error, we use the relationship of phasor between sub-carriers and make system synchronization using one tab equalizer. The designed OFDM block is described by Verilog HDL for the efficient and small size hardware. And we preform the functional verification and evaluation using the vector of standards.

  • PDF

A Numerical Study on Shear Behavior of the Interface between Blasted Rock and Concrete (발파 암반-콘크리트 경계면에서의 전단거동특성에 대한 수치해석적 연구)

  • Min, Gyeong-Jo;Ko, Young-Hun;Fukuda, Daisuke;Oh, Se-Wook;Kim, Jeong-Gyu;Chung, Moon-Kyung;Cho, Sang-Ho
    • Explosives and Blasting
    • /
    • v.37 no.4
    • /
    • pp.26-35
    • /
    • 2019
  • In designing a gravity-type anchorage of earth-anchored suspension bridge, the contact friction between a blasted rock mass and the concrete anchorage plays a key role in the stability of the entire anchorage. Therefore, it is vital to understand the shear behavior of the interface between the blasted rock mass and concrete. In this study, a portable 3D LiDAR scanner was utilized to scan the blasted bottom surfaces, and rock surface roughness was quantitatively analyzed from the scanned profiles to apply to 3D FEM modelling. In addition, based on the 3D FEM model, a three-dimensional dynamic fracture process analysis (DFPA-3D) technique was applied to study on the shear behavior of the interface between blasted rock and concrete through direct shear tests, which was analyzed under constant normal load (CNL). The effects of normal stress and the joint roughness on shear failure behavior are also analyzed.

Self-Recognition Algorithm of Artificial Immune System (인공면역계의 자기-인식 알고리즘)

  • 심귀보;선상준
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.801-806
    • /
    • 2001
  • According as many people use a computer newly, damage of computer virus and hacking is rapidly increasing by the crucial users A computer virus is one of program in computer and has abilities of self reproduction ad destruction like a virus of biology. And hacking is to rob a person's data in a intruded computer and to delete data in a person s computer from the outside. To block hacking that is intrusion of a person s computer and the computer virus that destroys data, a study for intrusion-detection of system and virus detection using a biological immune system is in progress. In this paper, we make a model of positive selection and negative selection of self-recognition process that is ability of T-cytotoxic cell that plays an important part in biological immune system. So we embody a self-nonself distinction algorithm in computer, which is an important part when we detect an infected data by computer virus and a modified data by intrusion from the outside. The composed self-recognition process distinguishes self-file from the changed files. To prove the efficacy of self-recognition algorithm, we use simulation by a cell change and a string change of self file.

  • PDF

Disparity estimation using wavelet transformation and reference points (웨이블릿 변환과 기준점을 이용한 변위 추정)

  • 노윤향;고병철;변혜란;유지상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.2A
    • /
    • pp.137-145
    • /
    • 2002
  • In the method of 3D modeling, stereo matching method which obtains three dimensional depth information from the two images is taken from the different view points. In general, it is very essential work for the 3D modeling from 2D stereo images to estimate the exact disparity through fading the conjugate pair of pixel from the left and right image. In this paper to solve the problems of the stereo image disparity estimation, we introduce a novel approach method to improve the exactness and efficiency of the disparity. In the first place, we perform a wavelet transformation of the stereo images and set the reference points in the image by the feature-based matching method. This reference points have very high probability over 95 %. In the base of these reference points we can decide the size of the variable block searching windows for estimating dense disparity of area based method and perform the ordering constraint to prevent mismatching. By doing this, we could estimate the disparity in a short time and solve the occlusion caused by applying the fried-sized windows and probable error caused by repeating patterns.

Architecture and Hardwarw Implementation of Dynamic GSMP V3 with Dynamic Buffer Management Scheme (동적 버퍼관리 방식의 Dynamic GSMP V3의 구조와 하드웨어 구현)

  • Kim, Young-Chul;Lee, Tae-Won;Kim, Kwang-Ok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.30-41
    • /
    • 2001
  • In this paper, the architecture of Dynamic GSMP V3(General Switch Management Protocol Version 3), an open interface protocol with resource management functions for efficient IP service on ATM over MPLS, is proposed and implemented in hardware. And we compare and analyze the proposed GSMP with the GSMP under standardization process in terms of CLR (Cell Loss Rate). We design the Slave block of the Dynamic GSMP V3 using SAM-SUNG SoG $0.5{\mu}m$ process, which performs functions for switch connection control in the ATM Switch. In order to compare difference performanaces between the proposed method and the conventional one, we conducts simulations using the minimum buffer search algorithm with random cell generation. The exponential results show that the proposed method leads to performance enhancement in CLR.

  • PDF

DSM Generation and Accuracy Comparison Using Stereo Matching Based on Image Segmentation (영상 분할 기반의 스테레오 매칭 기법을 이용한 DSM 생성 및 정확도 비교)

  • Kwon, Wonsuk
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.3
    • /
    • pp.401-413
    • /
    • 2019
  • The purpose of this study is to generate DSM using the stereo matching algorithm of worldview-1 stereo images and verify the accuracy of the generated DSM. To generate DSM, RPC block modeling was performed to correct RPC errors, and image matching was performed using SGM, which is a stereo matching algorithm after the epipolar image was generated. The COST for SGM was calculated by using CENSUS, and 4-paths and 8-paths were applied for COST aggregation in SGM. To verify the quality and accuracy of the generated DSM, it was compared with the LiDAR-derived DSM and the DSM generated by commercial SW. The results showed that the vertical accuracy of the generated DSM using 4-paths of COST aggregation was 1.647 m to 3.689 m (RMSE). In case of using 8-paths of COST aggregation was 1.550 m to 3.106 m (RMSE).

Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network (베이즈 네트워크를 이용한 탈중앙화 암호화폐 지갑의 정량적 위험성 평가)

  • Yoo, Byeongcheol;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.637-659
    • /
    • 2021
  • Since the creation of the first Bitcoin blockchain in 2009, the number of cryptocurrency users has steadily increased. However, the number of hacking attacks targeting assets stored in these users' cryptocurrency wallets is also increasing. Therefore, we evaluate the security of the wallets currently on the market to ensure that they are safe. We first conduct threat modeling to identify threats to cryptocurrency wallets and identify the security requirements. Second, based on the derived security requirements, we utilize attack trees and Bayesian network analysis to quantitatively measure the risks inherent in each wallet and compare them. According to the results, the average total risk in software wallets is 1.22 times greater than that in hardware wallets. In the comparison of different hardware wallets, we found that the total risk inherent to the Trezor One wallet, which has a general-purpose MCU, is 1.11 times greater than that of the Ledger Nano S wallet, which has a secure element. However, use of a secure element in a cryptocurrency wallet has been shown to be less effective at reducing risks.

Design of AES Cryptographic Processor with Modular Round Key Generator (모듈화된 라운드 키 생성회로를 갖는 AES 암호 프로세서의 설계)

  • 최병윤;박영수;전성익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.15-25
    • /
    • 2002
  • In this paper a design of high performance cryptographic processor which implements AES Rijndael algorithm is described. To eliminate performance degradation due to round-key computation delay of conventional processor, the on-the-fly precomputation of round key based on modified round structure is adopted. And on-the-fly round key generator which supports 128, 192, and 256-bit key has modular structure. The designed processor has iterative structure which uses 1 clock cycle per round and supports three operation modes, such as ECB, CBC, and CTR mode which is a candidate for new AES modes of operation. The cryptographic processor designed in Verilog-HDL and synthesized using 0.251$\mu\textrm{m}$ CMOS cell library consists of about 51,000 gates. Simulation results show that the critical path delay is about 7.5ns and it can operate up to 125Mhz clock frequency at 2.5V supply. Its peak performance is about 1.45Gbps encryption or decryption rate under 128-bit key ECB mode.

Interorganizational Networks for Smoking Prevention and Cessation: A Blockmodeling Approach (지역사회 기관 간 금연사업 네트워크 모델: 블록모델링을 중심으로)

  • Park, Eun-Jun;Kim, Hyeongsu;Lee, Kun Sei;Cho, Junghee;Kim, Jin Hyeong;Jeong, Ho Jin;Lee, Ji An
    • Journal of Korean Academy of Nursing
    • /
    • v.52 no.2
    • /
    • pp.202-213
    • /
    • 2022
  • Purpose: This study examined characteristics and patterns of interorganizational networks for smoking prevention and cessation in Korea. Methods: We surveyed two community health centers, ninety-five hospitals or clinics, ninety- two pharmacies, and sixty-five health welfare organizations in two districts of Seoul in 2020. Data on the organizations' characteristics of smoking cessation and interorganizational activities for information sharing, client referral, and program collaboration were collected and analyzed using network statistics and blockmodeling. Results: Network size was in the order of information sharing, client referral, and program collaboration networks. Network patterns for interorganizational activities on information sharing, client referral, and program collaboration among four organizations were similar between the two districts. Community health centers provided information and received clients from a majority of the organizations. Their interactions were not unidirectional but mutual with other organizations. Pharmacies were involved in information sharing with health welfare organizations and client referrals to hospitals or clinics. Health welfare organizations were primarily connected with the community health centers for client referrals and program collaboration. Conclusion: A community health center is the lead agency in interorganizational activities for smoking prevention and cessation. However, hospitals or clinics, pharmacies, and health welfare organizations also participate in interorganizational networks for smoking prevention and cessation with diverse roles. This study would be evidence for developing future interorganizational networks for smoking prevention and cessation.

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.