• Title/Summary/Keyword: Desing

Search Result 154, Processing Time 0.025 seconds

A Method for Designing Linear Phasee IIR Nyquist Filters (선형 위상 IIR나이퀴스트 필터의 설계 방법)

  • 맹승주;이병기
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.12
    • /
    • pp.11-19
    • /
    • 1994
  • In this paper, we propose a new method to desing IIR Nyquist filters. By thismethod, we can design IIR nyquist filters which prossess linear phase characteristics andare lower in order than FIR Nyquist filters. WE derive expressions for zero-phased IIR Nyquist filters and propose new desing methods for them. An iteration process is used to design the proposed IIR Nyquist filter, and in each iteration step a modified version of the Remez exchange algorithm is used. Finally, the propose desing method is demonstrated through design examples.

  • PDF

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

Monitoring Robot System with RF and Network Communication (네트워크 및 RF 기반의 감시용 로봇 시스템)

  • Kim, Dong-Hwan;Jeong, Gi-Beom;Hong, Yeong-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.9
    • /
    • pp.733-740
    • /
    • 2001
  • A monitoring robot capable of doing network and RF communication is introduced. The robot has several features that poses arbitrary position thanks to a mechanism combining the 4wheel drive and 4 link mechanism, transmits an image and command data via RF wireless communication. Moreover, the image data from the camera are transferred through a network communication. The robot plays a role in monitoring what is happening around the robot, and covers wide range due to a moving camera associated with the 4 arms. The robot can adjust its mass center by the 4 link mechanism, hence it guarantees a stability in moving on the slope.

  • PDF

The Analysis on Energy Performance according to Characteristics of Glazing in High-rise Office Buildings (Glazing 특성에 따른 고층 오피스 건물의 에너지성능 분석)

  • Hwang, Woo-Jin;Kim, Kyo-Joon;Choi, Won-Ki
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.04a
    • /
    • pp.156-161
    • /
    • 2011
  • In case of newly constructed buildings, the construction type is almost Curtain-wall system or large window in building skin. However, these kind of buildings have problems with regulations on building energy efficiency. And national regulations on building energy efficiency limit only the V-factor of window(except infiltration), it is hard to predict energy consumption of Curtain-wall buildings which gain large solar energy in summer. In this study, the influence of LSG(Light to Solar Gain) on energy performance was theoretically analyzed with simulation. LSG is the value of VLT divide SHGC and represents the optical performance of the glass or glazing. The Window & Therm program developed in LBNL was used to analyze window systems and EnergyPlus was used to building energy. Cases of glazing are three types; single coated Low-e clear glazing, tripple coated Low-e clear glazing, tripple coated Low-e tinted glazing. The results of this study are follows; 1) The building energy consumption of Alt-l, 2, 3 were about 300, 253, $259kWh/m^2{\cdot}yr$ respectively. Therefore, improvement of LSG could save the energy up to 16%. 2) The saved energy could be converted 1 billion won as annual benefit of total energy costs 3) SHGC and LSG more influence on cooling energy than heating energy in office buildings.

  • PDF

Seismic Design of Bridges in Low to Moderate Seismic Zones

  • Kook, Seung-Kyu
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.2 no.3
    • /
    • pp.121-127
    • /
    • 1998
  • For the seismic design of bridges in Korea classified as the low to moderate seismic zones, the design concepts provided in the Standard Specification for Highway Bridges, Division I-A: Seismic Design, are adopted, which is basically developed for the strong seismic zones by AASHITO. Accordingly, the design procedures provided for the low to moderate seismic zones are simplified too much to fulfill the purpose of the seismic design. In this paper the design procedures given for the low to moderate seismic zones in the Standard are summarized and discussed in view of the seismic design purpose. From the discussion results some revisions are proposed as conclusions for the reasonable a, pp.ication of the Standard for bridges located in the low to moderate seismic zones.

  • PDF

A study on the Frequency characteristics of the LLC-type P.R.C and S.R.C (LLC형 병렬 및 직렬 공진 컨버터의 주파수 특성에관한 연구)

  • Choi, J.G.;Cha, I.S.;Park, H.A.;Lee, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 1993.07b
    • /
    • pp.825-829
    • /
    • 1993
  • By using the state plane approach, the steady state analysis and desing of a high frequency LLC-type series resonant converter and LLC-type parallel resonant converter operating in the continuous conduction mode is presented. When a LLC-type P.R.C operates above resonant frequency, the switching transitor can be turn off at zero voltage. A set of characteristic frequency are plotted from which desing parameters can be obtained.

  • PDF

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF