• Title/Summary/Keyword: Fixed interference method

Search Result 83, Processing Time 0.029 seconds

NC Milling Productivity Incensement by Short Milling Tool Setting Method (NC 밀링에서 짧은 공구설치 방법으로 생산성 향상)

  • Kim, Su-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.5
    • /
    • pp.60-68
    • /
    • 2008
  • The tool overhang length affects tool deflection and chatter that should be reduced for machined surface quality, productivity and long tool lift. The shortest tool setting algorithm that uses a safe space is proposed and applied with simulation software in NC machining. The safe space in the coordinate fixed in the tool is computed by the virtual machining system that simulates NC machining by stock model, tool model and NC code. The optimal tool assembly that has largest diameter and shortest length is possible using the safe space. This algorithm has been applied over fifty companies for safe and rigid tool setting. The collision accident between holder and stock was reduced from 3 to 0 a year and the productivity was incensed about 15% by using faster feed rate acceptable for shorten tool length.

A Study on Jammer Suppression Algorithm for Non-stationary Jamming Environment (재머의 크기가 변하는 환경에서의 억제 알고리즘 연구)

  • Yoon, Ho-Jun;Lee, Kang-In;Chung, Young-Seek
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.2
    • /
    • pp.239-247
    • /
    • 2018
  • Adaptive Beamforming (ABF) algorithm, which is a typical jammer suppression algorithm, guarantees the performance on the assumption that the jamming characteristics of the TDS (Training Data Sample) are stationary, which are obtained immediately before and after transmitting the pulse signal. Therefore, effective jammer suppression can not be expected when the jamming characteristics are non-stationary. In this paper, we propose a new jammer suppression algorithm, of which power spectrum fluctuates fast. In this case, we assume that the location of the jammer station is fixed during the processing time. By applying the MPM (Matrix Pencil Method) to the jamming signal in TDS, we can estimate jammer parameters such as power and incident angle, of which the power will vary fast in time or range bins after TDS. Though we assume that the jammer station is fixed, the estimated jammer's incident angle has an error due to the noise, which degrades the performance of the jammer suppression as the jammer power increases fast. Therefore, the jammer's incident angle should be re-estimated at each range bin after TDS. By using the re-estimated jammer's incident angle, we can construct new covariance matrix under the non-stationary jamming environment. Then, the optimum weight for the jammer suppression is obtained by inversing matrix estimation method based on the matrix projection with the estimated jammer parameters as variables. To verify the performance of the proposed algorithm, the SINR (signal-to-interference plus noise ratio) loss of the proposed algorithm is compared with that of the conventional ABF algorithm.

Multibeam-based Subspace Approach for Code Acquisition in Antenna Array DS-CDMA Systems (안테나 어레이 DS-CDMA 통신 시스템에서 코드 동기 획득을 위한 다중 빔 기반의 부분공간 접근 방법)

  • Kim, Sang-Choon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1167-1173
    • /
    • 2005
  • In this paper, the use of an antenna array is considered for code timing acquisition of DS-CDMA signals. The probabilities of acquisition are evaluated by applying multiple narrow fixed-beams to the conventional MUSIC acquisition approach in the multiuser environment on the time-varying Rayleigh fading channel. Each fixed-beam for spatial filtering is dedicated to an individual angular sector that is formed by dividing the entire angular domain by the number of antenna elements. The fixed-beams with a capability of interference suppression provide the additional degrees of freedom,. Hence, the multibeam-based MUSIC estimator can be used to synchronize to more users than the conventional MUSIC algorithm for one antenna. The multibeam-based subspace method is evaluated to significantly improve the performance of a single antenna based MUSIC technique in multiuser scenarios.

Primary user localization using Bayesian compressive sensing and path-loss exponent estimation for cognitive radio networks

  • Anh, Hoang;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2338-2356
    • /
    • 2013
  • In cognitive radio networks, acquiring the position information of the primary user is critical to the communication of the secondary user. Localization of primary users can help improve the efficiency with which the spectrum is reused, because the information can be used to avoid harmful interference to the network while simultaneity is exploited to improve the spectrum utilization. Despite its inherent inaccuracy, received signal strength based on range has been used as the standard tool for distance measurements in the location detection process. Most previous works have employed the path-loss propagation model with a fixed value of the path loss exponent. However, in actual environments, the path loss exponent for each channel is different. Moreover, due to the complexity of the radio channel, when the number of channel increases, a larger number of RSS measurements are needed, and this results in additional energy consumption. In this paper, to overcome this problem, we propose using the Bayesian compressive sensing method with a calibrated path loss exponent to improve the performance of the PU localization method.

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation

  • Wang, Hao;Liu, Guangjie;Zhai, Jiangtao;Dai, Yuewei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1927-1943
    • /
    • 2016
  • Jitterbug is a passive network covert timing channel supplying reliable stealthy transmission. It is also the basic manner of some improved covert timing channels designed for higher undetectability. The existing entropy-based detection scheme based on training sample binning may suffer from model mismatching, which results in detection performance deterioration. In this paper, a new detection method based on the feature of Jitterbug covert channel traffic is proposed. A fixed binning strategy without training samples is used to obtain bins distribution feature. Coefficient of variation (CV) is calculated for several sets of selected bins and the weighted mean is used to calculate the final CV value to distinguish Jitterbug from normal traffic. Furthermore, the timing window parameter of Jitterbug is estimated based on the detected traffic. Experimental results show that the proposed detection method can achieve high detection performance even with interference of network jitter, and the parameter estimation method can provide accurate values after accumulating plenty of detected samples.

Universal and Can be Applied Wireless Channel Assignment Algorithm (범용 적용이 가능한 무선채널할당알고리즘)

  • Heo, Seo-Jung;Son, Dong-Cheul;Kim, Chang-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.375-381
    • /
    • 2012
  • If a mobile station requests a channel allocation in its mobile networks, the switching center assigns a channel to a mobile station that belongs to each base station. There are three kinds of channel allocation schemes; a fixed channel allocation, a dynamic channel allocation and a hybrid combination of these two forms. In assigning a good frequency, it is our intention to provide quality service to our customers as well as to use resources efficiently. This paper proposes methods of assigning frequencies that minimize interference between channels and that also minimize the amount of searching time involved. In this paper, we propose an algorithm to per specific equipment, regardless of the number of channels that can be used as a general-purpose system, such as base stations, control stations, central office model is proposed, the existing operators manner similar to the fixed channel allocation based statistics and assigned when the conventional method and the improved method is proposed. Different ways and compared via simulations to verify the effectiveness of the proposed approach.

Weighting Method to Identify Interharmonics based on Calculating the Bandwidth in Group-Harmonics

  • Vahedi, Hani;Kiapi, Alireza Alizadeh;Bina, Mohammad Tavakoli;Al-Haddad, Kamal
    • Journal of Power Electronics
    • /
    • v.13 no.1
    • /
    • pp.170-176
    • /
    • 2013
  • Power converters produce a vast range of harmonics, subharmonics and interharmonics. Harmonics analyzing tools based on the Fast Fourier Transform (FFT) assume that only harmonics are present and the periodicity intervals are fixed, while these periodicity intervals are variable and long in the presence of interharmonics. Using FFT may lead to invalid and undesired results due to the above mentioned issues. They can also lead to problems such as frequency blending, spectral leakage and the picket-fence effect. In this paper, the group-harmonic weighting (GHW) approach has been presented to identify the interharmonics in a power system. Afterwards, a modified GHW has been introduced to calculate the proper bandwidth for analyzing the various values of interharmonics. Modifying this method leads to more precise results in the FFT of a waveform containing inter harmonics especially in power systems with a fundamental frequency drift or frequency interference. Numerical simulations have been performed to prove the efficiency of the presented algorithm in interharmonics detection and to increase the accuracy of the FFT and the GWH methods.

Robust Secure Transmit Design with Artificial Noise in the Presence of Multiple Eavesdroppers

  • Liu, Xiaochen;Gao, Yuanyuan;Sha, Nan;Zang, Guozhen;Wang, Shijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2204-2224
    • /
    • 2021
  • This paper studies secure wireless transmission from a multi-antenna transmitter to a single-antenna intended receiver overheard by multiple eavesdroppers with considering the imperfect channel state information (CSI) of wiretap channel. To enhance security of communication link, the artificial noise (AN) is generated at transmitter. We first design the robust joint optimal beamforming of secret signal and AN to minimize transmit power with constraints of security quality of service (QoS), i.e., minimum allowable signal-to-interference-and-noise ratio (SINR) at receiver and maximum tolerable SINR at eavesdroppers. The formulated design problem is shown to be nonconvex and we transfer it into linear matrix inequalities (LMIs). The semidefinite relaxation (SDR) technique is used and the approximated method is proved to solve the original problem exactly. To verify the robustness and tightness of proposed beamforming, we also provide a method to calculate the worst-case SINR at eavesdroppers for a designed transmit scheme using semidefinite programming (SDP). Additionally, the secrecy rate maximization is explored for fixed total transmit power. To tackle the nonconvexity of original formulation, we develop an iterative approach employing sequential parametric convex approximation (SPCA). The simulation results illustrate that the proposed robust transmit schemes can effectively improve the transmit performance.

Design of Variable Grid Map based on Wi-Fi Signal for Location Search (위치탐색을 위한 Wi-Fi 신호 기반 가변 Grid Map 설계)

  • Kim, Dong-Hyeon;Yi, Hyoun-sup;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.59-61
    • /
    • 2022
  • Among indoor positioning system techniques using wireless APs, fingerprint techniques collect Mac information and reception strength of APs before performing positioning, build a radio map, and compare it with AP information collected during positioning. However, the existing Radio Map construction method has a problem in that signal interference occurs due to collisions of numerous APs depending on the indoor environment, and the signal strength search result is not always constant. Therefore, this paper compares the existing fixed radio map construction method and the variable radio map construction technique that actively analyzes and constructs the measurement area itself according to signal strength.

  • PDF

Dynamic Carrier Sensing Threshold Scheme based on SINR for Throughput Improvement in MANET (MANET에서 처리율 향상을 위한 SINR 기반 동적 캐리어 감지 임계값 방법)

  • Lee, Hyun-No;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.319-326
    • /
    • 2014
  • IEEE 802.11 WLAN uses CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) method in MAC(Media Access Control) protocol, and through the carrier sense checks whether other users use the channel during the data transmission to avoid the data collision. Currently, IEEE 802.11 standard recommends the use of a fixed threshold which gives an impact on carrier sensing range. However, the existing scheme using the fixed threshold causes the operation of network to be inefficiency owing to the mobility in MANET(Mobile Ad hoc NETwork). In this paper, we found the better network throughput to be obtained by applying the proposed scheme, which chooses properly the carrier sensing threshold and transmission rate considering SINR(Signal to Interference-plus-Noise Ratio), to the MANET.