• 제목/요약/키워드: Desing

검색결과 154건 처리시간 0.021초

선형 위상 IIR나이퀴스트 필터의 설계 방법 (A Method for Designing Linear Phasee IIR Nyquist Filters)

  • 맹승주;이병기
    • 전자공학회논문지B
    • /
    • 제31B권12호
    • /
    • pp.11-19
    • /
    • 1994
  • In this paper, we propose a new method to desing IIR Nyquist filters. By thismethod, we can design IIR nyquist filters which prossess linear phase characteristics andare lower in order than FIR Nyquist filters. WE derive expressions for zero-phased IIR Nyquist filters and propose new desing methods for them. An iteration process is used to design the proposed IIR Nyquist filter, and in each iteration step a modified version of the Remez exchange algorithm is used. Finally, the propose desing method is demonstrated through design examples.

  • PDF

802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴 (A New Rekeying Scheme for 802.11 Wireless Packets Transmission)

  • 팽상우;태유슈;치시안양;이훈재;임효택
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

네트워크 및 RF 기반의 감시용 로봇 시스템 (Monitoring Robot System with RF and Network Communication)

  • 김동환;정기범;홍영호
    • 제어로봇시스템학회논문지
    • /
    • 제7권9호
    • /
    • pp.733-740
    • /
    • 2001
  • 네트워크와 RF 통신이 가능한 감시용 로봇에 대해 소개한다. 이 로봇은 4 바퀴와 4개의 링크로 구성된 메카니즘으로 인하여 자유로운 위치 조절이 가능하며, 이미지와 데이터를 RF를 통하여 전송하는 기능을 지니고 있다. 또한 네트워크 상에서 데이터와 카메라 이미지가 전송된다. 이 로봇은 로봇 주위에 일어나는 상황을 모니터링하고 4개의 암 구조를 통하여 넓은 영역을 확보한다. 이 로봇은 4개의 링크를 통하여 무게 중심을 조정하여 경사지에서의 안정성을 보장한다.

  • PDF

Glazing 특성에 따른 고층 오피스 건물의 에너지성능 분석 (The Analysis on Energy Performance according to Characteristics of Glazing in High-rise Office Buildings)

  • 황우진;김교준;최원기
    • 한국태양에너지학회:학술대회논문집
    • /
    • 한국태양에너지학회 2011년도 춘계학술발표대회 논문집
    • /
    • pp.156-161
    • /
    • 2011
  • In case of newly constructed buildings, the construction type is almost Curtain-wall system or large window in building skin. However, these kind of buildings have problems with regulations on building energy efficiency. And national regulations on building energy efficiency limit only the V-factor of window(except infiltration), it is hard to predict energy consumption of Curtain-wall buildings which gain large solar energy in summer. In this study, the influence of LSG(Light to Solar Gain) on energy performance was theoretically analyzed with simulation. LSG is the value of VLT divide SHGC and represents the optical performance of the glass or glazing. The Window & Therm program developed in LBNL was used to analyze window systems and EnergyPlus was used to building energy. Cases of glazing are three types; single coated Low-e clear glazing, tripple coated Low-e clear glazing, tripple coated Low-e tinted glazing. The results of this study are follows; 1) The building energy consumption of Alt-l, 2, 3 were about 300, 253, $259kWh/m^2{\cdot}yr$ respectively. Therefore, improvement of LSG could save the energy up to 16%. 2) The saved energy could be converted 1 billion won as annual benefit of total energy costs 3) SHGC and LSG more influence on cooling energy than heating energy in office buildings.

  • PDF

Seismic Design of Bridges in Low to Moderate Seismic Zones

  • Kook, Seung-Kyu
    • 한국지진공학회논문집
    • /
    • 제2권3호
    • /
    • pp.121-127
    • /
    • 1998
  • For the seismic design of bridges in Korea classified as the low to moderate seismic zones, the design concepts provided in the Standard Specification for Highway Bridges, Division I-A: Seismic Design, are adopted, which is basically developed for the strong seismic zones by AASHITO. Accordingly, the design procedures provided for the low to moderate seismic zones are simplified too much to fulfill the purpose of the seismic design. In this paper the design procedures given for the low to moderate seismic zones in the Standard are summarized and discussed in view of the seismic design purpose. From the discussion results some revisions are proposed as conclusions for the reasonable a, pp.ication of the Standard for bridges located in the low to moderate seismic zones.

  • PDF

LLC형 병렬 및 직렬 공진 컨버터의 주파수 특성에관한 연구 (A study on the Frequency characteristics of the LLC-type P.R.C and S.R.C)

  • 최장균;차인수;박해암;이권현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1993년도 하계학술대회 논문집 B
    • /
    • pp.825-829
    • /
    • 1993
  • By using the state plane approach, the steady state analysis and desing of a high frequency LLC-type series resonant converter and LLC-type parallel resonant converter operating in the continuous conduction mode is presented. When a LLC-type P.R.C operates above resonant frequency, the switching transitor can be turn off at zero voltage. A set of characteristic frequency are plotted from which desing parameters can be obtained.

  • PDF

IPv6의 방화벽 규칙을 기반으로한 보안위험 평가 (Security Risks Evaluation based on IPv6 Firewall Rules)

  • 팽상우;이훈재;임효택
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF