• Title/Summary/Keyword: 직렬 통신

Search Result 425, Processing Time 0.024 seconds

Study on CGM-LMS Hybrid Based Adaptive Beam Forming Algorithm for CDMA Uplink Channel (CDMA 상향채널용 CGM-LMS 접목 적응빔형성 알고리듬에 관한 연구)

  • Hong, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9C
    • /
    • pp.895-904
    • /
    • 2007
  • This paper proposes a robust sub-optimal smart antenna in Code Division Multiple Access (CDMA) basestation. It makes use of the property of the Least Mean Square (LMS) algorithm and the Conjugate Gradient Method (CGM) algorithm for beamforming processes. The weight update takes place at symbol level which follows the PN correlators of receiver module under the assumption that the post correlation desired signal power is far larger than the power of each of the interfering signals. The proposed algorithm is simple and has as low computational load as five times of the number of antenna elements(O(5N)) as a whole per each snapshot. The output Signal to Interference plus Noise Ratio (SINR) of the proposed smart antenna system when the weight vector reaches the steady state has been examined. It has been observed in computer simulations that proposed beamforming algorithm improves the SINR significantly compared to the single antenna case. The convergence property of the weight vector has also been investigated to show that the proposed hybrid algorithm performs better than CGM and LMS during the initial stage of the weight update iteration. The Bit Error Rate (BER) characteristics of the proposed array has also been shown as the processor input Signal to Noise Ratio (SNR) varies.

The fabrication and analysis of the SFIT type filter (SPIT형 필터 제작 및 분석)

  • You, Il-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.699-706
    • /
    • 2010
  • We have studied to obtain the slanted finger interdigital(SFIT) type filter was formed on the Langasite substrate and was evaporated two IDT electrode by Aluminum-Copper alloy respectively. We can fabricate that the block weighted type IDT as an input transducer of the filter and the withdrawal weighted type IDT as an output transducer of the filter from the results of our computer-simulation. Also, we have performed to obtain the properly design conditions about phase shift conditions of the SPIT type filter. We have employed that the number of pairs of the input and output IDT are 50 pairs and the thickness and the width of reflectors are $5000\;{\AA}$ and $3.6{\mu}m$ respectively. At the first sample, we have employed that the distance from the hot electrode to the reflectors is $2.4{\mu}m$ distance from the ground electrode to the reflectors is $1.8{\mu}m$ and the distance from the hot electrode to the ground is $1.5{\mu}m$ respectively. At the other sample, we have also employed that the distance from the hot electrode to the reflectors and the distance from the ground electrode to the reflectors are $2.4{\mu}m$. Frequency response of the fabricated SAW filter has the property that the center frequency is about 190MHz and bandwidth at the 3dB is probably 7.3 MHz. And we could obtain that return is less than -20dB, ripple characteristics is probably 3dB and triple transit echo(TTE) is less than -22dB after when we have matched impedance.

Development of a Face Detection and Recognition System Using a RaspberryPi (라즈베리파이를 이용한 얼굴검출 및 인식 시스템 개발)

  • Kim, Kang-Chul;Wei, Hai-tong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.859-864
    • /
    • 2017
  • IoT is a new emerging technology to lead the $4^{th}$ industry renovation and has been widely used in industry and home to increase the quality of human being. In this paper, IoT based face detection and recognition system for a smart elevator is developed. Haar cascade classifier is used in a face detection system and a proposed PCA algorithm written in Python in the face recognition system is implemented to reduce the execution time and calculates the eigenfaces. SVM or Euclidean metric is used to recognize the faces detected in the face detection system. The proposed system runs on RaspberryPi 3. 200 sample images in ORL face database are used for training and 200 samples for testing. The simulation results show that the recognition rate is over 93% for PP+EU and over 96% for PP+SVM. The execution times of the proposed PCA and the conventional PCA are 0.11sec and 1.1sec respectively, so the proposed PCA is much faster than the conventional one. The proposed system can be suitable for an elevator monitoring system, real time home security system, etc.

Optimal Design Method of 1-Port Surge Protective Device Based on Zinc Oxide Varistor (선화아연바리스터 기반의 1-포트 서지보호장치의 최적 설계 기법)

  • Jeong, Tae-Hoon;Kim, Young-Sung;Park, Geun-Bo;Lee, Seung-IL
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.93-102
    • /
    • 2018
  • This paper reports a Surge Protective Device (SPD) that is used to protect an automatic metering interface (AMI) power supplies of communication equipment on a low-voltage distribution system from a lightning current. The surge protective device (SPD) can be classified as one-port SPDs and two-port SPDs with decoupling elements depending on the connection type. The protection of internal systems against the lightning current may require a systematic approach consisting of coordinated SPDs. To deal with this, the definition of a lightning protection zone (LPZ) was studied and interpreted through a theoretical review. Because the lightning current resulting from a lightning surge is considerably high, there is limited protection from one SPD; therefore, coordinated cascaded MOV-based SPDs are installed to solve this problem. Regarding the power grid mentioned in this paper, a class II SPD for the low-voltage distribution system installed on the border of LPZ1 and LPZ2, which establish a protection coordination with the Arrester (LA, SA) that corresponds to the LPZO installed on the MOF stage connected to one system were designed to protect various communication (control) equipment, including the automatic meter reading system inside the branch-type electric supply panel of a building, not the incoming side of one system. In addition, performance-related tests were done by a comparison with the existing method through testing, and the optimal design was achieved for the 1-port SPD that uses a series connection and can bleed load current without any decoupling element.

An Effective Method to Treat The Boundary Pixels for Image Compression with DWT (DWT를 이용한 영상압축을 위한 경계화소의 효과적인 처리방법)

  • 서영호;김종현;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.618-627
    • /
    • 2002
  • In processing images using 2 dimensional Discrete Wavelet Transform(2D-DWT), the method to process the pixels around the image boundary may affect the quality of image and the cost to implement in hardware and software. This paper proposed an effective method to treat the boundary pixels, which is apt to implement in hardware and software without losing the quality of the image costly. This method processes the 2-D image as 1-D array so that 2-D DWT is performed by considering the image with the serial-sequential data structure (Serial-Sequential Processing). To show the performance and easiness in implementation of the proposed method, an image compression codec which compresses image and reconstructs it has been implemented and experimented. It included log-scale fried quantizer, but the entropy coder was not implemented. From the experimental results, the proposed method showed the SNR of almost the same SNR(Signal to Noise Ratio) to the Periodic Expansion(PE) method when the compression ratio(excluding entropy coding) of 2:1, 15.3% higher than Symmetric Expansion(SE) method, and 9.3% higher than 0-pixel Padding Expansion(ZPE) method. Also PE method needed 12.99% more memory space than the proposed method. By considering only the compression process, SE and ZPE methods needed additional operations than the proposed one. In hardware implementation, the proposed method in this paper had 5.92% of overall circuit as the control circuit, while SE, PE, and ZPE method has 22%, 21,2%, and 11.9% as the control circuit, respectively. Consequently, the proposed method can be thought more effective in implementing software and hardware without losing any image quality in the usual image processing applications.

Development of RFID for Automatic Radiopharmaceuticals Preparation System (방사성 의약품 자동합성 장치용 RFID 시스템의 개발)

  • Kim, Myung-Sik;Kim, Kwang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.429-436
    • /
    • 2012
  • In this paper, an RFID system for the automatic preparation system of positron emission tomography (PET) radiopharmaceuticals is developed. Since the preparation system uses radioactive isotope, the preparation system is generally placed in lead-shielded hot-cell. Disposable cassettes including tubes and valves are used in the preparation system, since they are easily contaminated by radioactivity during preparation of radiopharmaceuticals. Currently, a system for preventing re-use of the cassette and managing the information about the preparation precess and result independently from the PC which control the preparation system is highly required for preventing danger from the radiation accident. Since RFID can store and re-write relatively large amount of information, it is suitable for the purpose. However, it is hard to read multiple cassettes' information using antennas installed on the metallic surfaces with current RFID systems. For the problem, we improve RFID system in two directions. First, the interface of the RFID reader is changed then it is possible that multiple readers can be daisy-chained. Also, antenna is tuned while inserting in a metallic coated antenna case, then the effect from the metallic surface of the preparation system is minimized. The test result using the developed system shows that the developed RFID system can read multiple tags using the antennas which are attached on the metallic surface.

The basic experiments for the fabrication of the SPUDT type Inter using the SFIT type filter (SFIT형태를 이용한 SPUDT형 필터제작에 관한 기초실험)

  • You, Il-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1916-1923
    • /
    • 2007
  • We have studied to obtain the SAW filter for the passband was formed on the Langasite substrate and was evaporated by Aluminum-Copper alloy and thin we performed computer-simulated by simulator. We cm fabricate that the block weighted type IDT as an input transducer of the filter and the withdrawal weighted type IDT as an output transducer of the filter from the results of our computer-simulation. Also, we have performed to obtain the properly design conditions about phase shift of the SAW filter for WCDMA. We have employed that the number of pairs of the input and output IDT are 50 pairs and the thickness and the width of reflector are $5000\;{\AA}$ and $3.6{\mu}m$ respectively. And we have employed that the distances from the hot electrode to the reflector are $2.0{\mu}m$, $2.4{\mu}m$ and the distance from the hot electrode to the ground is $1.5{\mu}m$ respectively. Frequency response of the fabricated SAW filter has the property that the center frequency is about 190MHz and bandwidth at the 3dB is probably 7,8MHz. And we could obtain that return loss is less then -18dB, ripple characteristics is probably 3dB and triple transit echo is less then -25dB after when we have matched impedance.

The analysis of the operating characteristic for the wideband coaxial line impedance transformer (광대역 동축선로 임피던스 변환회로의 동작 특성 분석)

  • Park, Ung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.165-172
    • /
    • 2019
  • Using two or more coaxial lines, if one port is connected in series and the other port is connected in parallel, it can be implemented the wideband transmission line transformer(TLT). Because the wideband TLT utilizes the outer conductor of the coaxial line, it is difficult to predict the characteristics. In this paper, based on the analysis for the transfer characteristic(S21) according to the loss of the each line in ${\lambda}/4$-microstrip line TLT, the operating characteristic of the fabricated wideband 4:1 TLT using two $25{\Omega}$-coaxial lines is investigated. The fabricated wideband TLT shows the notch characteristic in which the transfer signal sharply decreases at ${\lambda}/4$ frequency of the coaxial line and has a value within -0.2dB of the transfer characteristic(S21) in $0.06{\sim}0.2{\lambda}$ frequency range of the coaxial line. This transfer characteristics(S21) can change the operating frequency range slightly and set the optimum transfer characteristic(S21) at the desired frequency by changing the length of the microstrip line.

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.

Implementation of a pipelined Scalar Multiplier using Extended Euclid Algorithm for Elliptic Curve Cryptography(ECC) (확장 유클리드 알고리즘을 이용한 파이프라인 구조의 타원곡선 암호용 스칼라 곱셈기 구현)

  • 김종만;김영필;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.17-30
    • /
    • 2001
  • In this paper, we implemented a scalar multiplier needed at an elliptic curve cryptosystem over standard basis in $GF(2^{163})$. The scalar multiplier consists of a radix-16 finite field serial multiplier and a finite field inverter with some control logics. The main contribution is to develop a new fast finite field inverter, which made it possible to avoid time consuming iterations of finite field multiplication. We used an algorithmic transformation technique to obtain a data-independent computational structure of the Extended Euclid GCD algorithm. The finite field multiplier and inverter shown in this paper have regular structure so that they can be easily extended to larger word size. Moreover they can achieve 100% throughput using the pipelining. Our new scalar multiplier is synthesized using Hyundai Electronics 0.6$\mu\textrm{m}$ CMOS library, and maximum operating frequency is estimated about 140MHz. The resulting data processing performance is 64Kbps, that is it takes 2.53ms to process a 163-bit data frame. We assure that this performance is enough to be used for digital signature, encryption & decryption and key exchange in real time embedded-processor environments.