• Title/Summary/Keyword: 윈도우 제어

Search Result 327, Processing Time 0.024 seconds

A Mixed-Signal IC for Magnetic Stripe Storage System (자기 띠 저장 시스템을 위한 혼성 신호 칩)

  • Lim, Shin-Il;Choi, Jong-Chan
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.34-41
    • /
    • 1998
  • An integrated circuit for magnetic stripe storage system is implemented. All the analog and digital circuits are integrated in one chip. The analog block contains preamplifier, peak detecter, comparator and reference generater. And digital block includes reference window signal generater, up/down counter for F/2F signal measurement, bit-error detection logic, and control logic. Both the encoding and decoding functions for F/2F signal processing are provided. An AGC(automatic gain control) circuit which was included in conventional circuits is eliminated due to optimized circuit design. Misreading prevention circuits are also proposed by fixing up new reference bit when broken bits are detected. The prototype chip is implemented using $0.8{\mu}m$ N-well CMOS technology and operates from 3.3 V to 7.5 V of supply voltage. It occupies a die area of $3.04mm^2(1.6mm{\times}1.9mm)$ and dissipates 8 mW with a 5 V supply voltage.

  • PDF

Kinematic Analysis of the Quadruped Robot Using Computer Graphics (컴퓨터 그래픽스를 이용한 사각보행로보트의 기구적 해석)

  • Choi, Byoung-Wook;Lim, Joon-Hong;Chung, Myung-Jin;Bien, Zeung-Nam
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.10
    • /
    • pp.1173-1182
    • /
    • 1988
  • The stability, energetic efficiency and walking volume are affected by the geometric structure of legs of a walking robot. A quadruped walking robot is considered to have large stability margin among the walking robots and pantograph leg permits large walk stroke and mutually independent vertical and horizontal movements, but the kinematic characteristics are difficult to analyze. Graphical method may be useful to characterize three dimensional legged motion of the pantograph mechanism. We present the modelling method for three different quadruped robots with pantograph legs that have different joints mechanism. The modeled robots are animated by a path that is planned with respect to the center of body. In particular, graphical animation incorporates leg control to rotation and side walking and uses the window of Sun-3 system for displaying joint information.

  • PDF

Development and Performance Evaluation of Multiple Sensor for Groundwater Quality Monitoring and Remote Control System using IoT (IoT기반 지하수 수질모니터링을 위한 다중센서모듈 개발 및 성능평가)

  • Chang, Hyunjin;Moon, Boram;Yoon, Seunggyun;Jin, Taeseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1957-1963
    • /
    • 2017
  • This paper has proposed a new-type groundwater auto-monitoring system based on Multi-Sensor Device. The system adopted Multi-Sensor Device as host computer of data acquisition, used Windows Mobile which was prevalent operation system of Multi-Sensor Device. It adopted serial port CAN and RS485 as the communication interface between goundwater sensor Device and monitor host machine and utilized serial-linked multi-sensor design to measure effectively according to the depth of groundwater. We present a design for a groundwater monitoring system based on a network of wirelessly linked sensors. The proposed solution will enable groundwater researchers and decision makers to have quick access to the groundwater data with less effort and cost. Though our design is initially meant for groundwater monitoring, it can be easily adapted to other fields of environmental monitoring.

Active Object Tracking based on stepwise application of Region and Color Information (지역정보와 색 정보의 단계적 적용에 의한 능동 객체 추적)

  • Jeong, Joon-Yong;Lee, Kyu-Won
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.107-112
    • /
    • 2012
  • An active object tracking algorithm using Pan and Tilt camera based in the stepwise application of region and color information from realtime image sequences is proposed. To reduce environment noises in input sequences, Gaussian filtering is performed first. An image is divided into background and objects by using the adaptive Gaussian mixture model. Once the target object is detected, an initial search window close to an object region is set up and color information is extracted from the region. We track moving objects in realtime by using the CAMShift algorithm which enables to trace objects in active camera with the color information. The proper tracking is accomplished by controlling the amount of pan and tilt to be placed the center position of object into the middle of field of view. The experimental results show that the proposed method is more effective than the hand-operated window method.

An Adaptive Gradient-Projection Image Restoration using Spatial Local Constraints and Estimated Noise (국부 공간 제약 정보 및 예측 노이즈 특성을 이용한 적응 Gradient-Projection 영상 복원 방식)

  • Hong, Min-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10C
    • /
    • pp.975-981
    • /
    • 2007
  • In this paper, we propose a spatially adaptive image restoration algorithm using local and statistics and estimated noise. The ratio of local mean, variance, and maximum values with different window size is used to constrain the solution space, and these parameters are computed at each iteration step using partially restored image. In addition, the additive noise estimated from partially restored image and the local constraints are used to determine a parameter for controlling the degree of local smoothness on the solution. The resulting iterative algorithm exhibits increased convergence speed when compared to the non-adaptive algorithm. In addition, a smooth solution with a controlled degree of smoothness is obtained without a prior knowledge about the noise. Experimental results demonstrate that the proposed algorithm requires the similar iteration number to converge, but there is the improvement of SNR more than 0.2 dB comparing to the previous approach.

System Design of 900MHz RFID Eucational System including the Active Tag (능동형 태그를 포함한 900MHz RFID 교육용 시스템의 설계)

  • Kim, H.C.;Ohlzahas, A.;Kim, J.M.;Jin, H.S.;Cho, D.G.;Chung, J.S.;Kang, O.H.;Jung, K.W.
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.51-59
    • /
    • 2007
  • This paper presents the development of RFID educational system based on using 900MHz air interface between the reader and the active tag. The software of reader and the active tag is developed on embedded environment, and the software of PC controlling the reader is based on window OS operated as the server. The AT89C51ED2 VLSI chip is used for the processor of the reader and the active tag. As the development environment, Keil compiler is used for the reader and the active tag of which the programing language is C. The visual C language of the visual studio on the PC activated as the server is used for development language. To verify the function of the system, PC gets the tag's identification number through the reader and send the data to with the active tag memory a certain contents as "wite" operation. Finally the data written from the active tag's memory is sent to the PC via the reader as "read" operation and compare the received data with one already sent to the tag.

  • PDF

Adaptive Buffer Control over Disordered Streams (비순서화된 스트림 처리를 위한 적응적 버퍼 제어 기법)

  • Kim, Hyeon-Gyu;Kim, Cheol-Gi;Lee, Chung-Ho;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.5
    • /
    • pp.379-388
    • /
    • 2007
  • Disordered streams may cause inaccurate or delayed results in window-based queries. Existing approaches usually leverage buffers to hand]e the streams. However, most of the approaches estimate the buffer size simply based on the maximum network delay in the streams, which tends to over-estimate the buffer size and result in high latency. In this paper, we propose a probabilistic approach to estimate the buffer size adaptively according to the fluctuated network delays. We first assume that intervals of tuple generations follow an exponential distribution and network delays have a normal distribution. Then, we derive an estimation function from the assumptions. The function takes a drop ratio as an input parameter, which denotes a percentage of tuple drops permissible during query execution. By describing the drop ratio in a query specification, users can control the quality of query results such as accuracy or latency according to application requirements. Our experimental results show that the proposed function has better adaptivity than the existing function based on the maximum network delay.

An asymmetric WDM-EPON structure for the convergence of broadcast and communication (방송통신 통합을 위한 비대칭 WDM-EPON 구조에 관한 연구)

  • Hur Jung;Koo Bon-Jeong;Park Youngil
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.182-189
    • /
    • 2005
  • In this paper, an asymmetric WDM-EPON transmission scheme is proposed to be used in a high speed access network system, which is required to implement the convergence of broadcast and communication. WDM is used for downstream transmission from OLT to access nodes, satisfying wide bandwidth requirement for broadcasting and various multimedia services. And an EPON scheme, which is cheaper than WDM, is applied to upstream transmission where less bandwidth is required. A transmission test in physical layer was performed successfully and the results are provided. If ONUs are to be used in a home gateway, its protocol should be appropriate to its traffic pattern. Voice is sensitive to a time delay while data is not. A new dynamic bandwidth assignment protocol for PON system, which can cope with various types of data in access network is proposed and its performance is analysed. A maximum cycle time is specified to achieve the QoS of signals sensitive to time delay. And a minimum window is specified to prevent the downstream control signals from uprising. It is shown by simulation that the proposed EPON protocol can provide a better performance than previous ones.

Design of a Correlator and an Access-code Generator for Bluetooth Baseband (블루투스 기저대역을 위한 상관기와 액세스 코드 생성 모듈의 설계)

  • Hwang Sun-Won;Lee Sang-Hoon;Shin Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.206-211
    • /
    • 2005
  • We describe the design for a correlator and an access code generator in bluetooth system. These are used for a connection setting, a packet decision and a clock synchronization between Bluetooth units. The correlator consists of two blocks; carry save adder based on Wallace tree and threshold-value decision block. It determines on an useful packet and clock-synchronization for input signal of 1.0Mbps through the sliding-window correlating. The access-code generator also consists of two blocks; BCH(Bose-Chadhuri-Hocquenghem) cyclic encoder and control block. It generates the access-codes according to four steps' generation process based on Bluetooth standard. In order to solve synchronization problem, we make use of any memory as a pseudo random sequence. The proposed correlator and access-code generator were coded with VHDL. An FPGA Implementation of these modules and the simulation results are proved by Xilinx chip. The critical delay and correlative margin based on synthesis show the 4.689ns and the allowable correlation-error up to 7-bit.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF