• Title/Summary/Keyword: Ghost problem

Search Result 30, Processing Time 0.025 seconds

Performance Analysis of Data Association Applied Frequency Weighting in 3-Passive Linear Array Sonars (주파수 가중치를 적용한 3조의 수동 선배열 소나 센서의 정보 연관 성능 분석)

  • 구본화;윤제한;홍우영;고한석
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.2
    • /
    • pp.109-116
    • /
    • 2004
  • This paper deals with data association using 3 sets of passive linear array sonars (PUS) geometrically positioned in a Y-shaped configuration, but fixed in an underwater environment. The data association problem is directly transformed into a 3-D assignment problem, which is known to be NP-hard. For generic passive sensors, it can be sotted using conventional algorithms, while it in PLAS becomes a formidable task due to the presence of bearing ambiguity. In particular, we proposed data association method robust to bearing measurements errors by incorporating frequency information and analyze a region of ghost problem by geometrical relation PUS and target. We analyzed the effectiveness of the proposed method by representative simulation in multi-target.

Simple Denoising Method for Novel Speckle-shifting Ghost Imaging with Connected-region Labeling

  • Yuan, Sheng;Liu, Xuemei;Bing, Pibin
    • Current Optics and Photonics
    • /
    • v.3 no.3
    • /
    • pp.220-226
    • /
    • 2019
  • A novel speckle-shifting ghost imaging (SSGI) technique is proposed in this paper. This method can effectively extract the edge of an unknown object without achieving its clear ghost image beforehand. However, owing to the imaging mechanism of SSGI, the imaging result generally contains serious noise. To solve the problem, we further propose a simple and effective method to remove noise from the speckle-shifting ghost image with a connected-region labeling (CRL) algorithm. In this method, two ghost images of an object are first generated according to SSGI. A threshold and the CRL are then used to remove noise from the imaging results in turn. This method can retrieve a high-quality image of an object with fewer measurements. Numerical simulations are carried out to verify the feasibility and effectiveness.

Multi Physics research of Energy material using Ghost Fluid concept (Ghost Fluid concept기반의 에너지 물질의 Multi Physics 연구)

  • Kim, Ki-Hong;Yoh, Jai-Ick
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.299-302
    • /
    • 2006
  • We present an innovative means of numerically treating interfaces associated with chemically active energetic materials. Recent advances in wave tracking technique based on the Ghost Fluid Concept is extended to handle multi-material multi-phase interfaces associated with chemical environment associated with explosion. We show several work-in-progress applications of our code, including the impact problems involving both energetic and inert elements. Accurate modeling of the equation of state and the constitutive relations are also discussed

  • PDF

Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

  • Yuan, Sheng;Liu, Xuemei;Zhou, Xin;Li, Zhongyang
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.476-480
    • /
    • 2016
  • For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.

A Study on Ludo-narrative Harmony in the Video Game "Ghost of Tsushima" (비디오 게임 "고스트 오브 쓰시마"의 게임플레이-스토리의 조화성 고찰)

  • Chun, Bumsue
    • Journal of Korea Game Society
    • /
    • v.21 no.5
    • /
    • pp.87-104
    • /
    • 2021
  • Ludo-narrative dissonance is a prevalent problem among open-world genre video games. However, Ghost of Tsushima (2020) alleviates this issue by designing its characters and narrative structure influenced by Akira Kurosawa's samurai films. The game's protagonist represents "Bushido," a samurai code, and the structure exudes similarity to Joseph Campbell's "Hero's Journey," which heavily influenced Kurosawa's films. The developers also designed the gameplay mechanics such as level-up system, map design, and side quests based on these narrative traits, ultimately making the goal of the narrative and the gameplay mechanics cohesive.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

Verification on the Ghost Fishing by Derelict Fishing Gears through the Tank Experiments (폐어구로 인해 발생하는 유령어업 효과에 대한 실험적인 고찰)

  • KIM, Seonghun;YANG, Yong-Su;JEONG, Juhui;SONG, Min-Su;LEE, Doe-Hyeon;CHOI, Mun-Bo;CHA, Sang-Hoon;LEE, Chang-Hyeon;KIM, Hyung-Seok
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.5
    • /
    • pp.1258-1265
    • /
    • 2016
  • The aim of this study was to evaluate the impact on the fishery resources and marine ecosystems by derelict fishing gears as part of the R & E (Research and Education) program that supervised by the busan metropolitan city office of education. In this study, we verified the ghost fishing effects caused by derelict fishing gears through the process which fish were caught to be attracted to bait for gillnet and trap in tank. In results, the dead fish to be gilled in gillnet and to enter in pot have been shown to attract other fish to the bait role. The result showed that the ghost fishing was caused by abandoned, lost or discarded fishing gears continuously. In particular, as a result of pot experiment, if the lost pot has a escape device, the entered fish could escape from the pot and the fisheries resources could protect from derelict fishing gears. In addition, the high school students are capable of raising the problem solving skills through carrying out the research project and expect to contribute to raising awareness about the protection of the marine environment.

Numerical Study of Interior Ballistics with Moving Boundary

  • Sung, Hyung-Gun;Park, Sol;Hong, Gi-Cheol;Roh, Tae-Seong;Choi, Dong-Whan
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.659-665
    • /
    • 2008
  • The 1-D numerical study of the interior ballistics has been conducted. The unsteady compressible 1-D CFD code using SIMPLER algorithm and QUICK scheme has been developed. The mathematical model of the two-phase flow has been established for the behavior of the interior ballistics. The moving boundary due to the projectile motion as the physical phenomena of the interior ballistics results in the varied control volume. In order to analyze the moving boundary, the numerical codes, which apply the ghost-cell extrapolation method and the Lagrangian method respectively, have been developed. The ghost-cell extrapolation method has been used in the Eulerian coordinate system. The Lagrangian method has been used in Non-Eulerian coordinate system. These codes have been verified through the analysis of the free piston motion problem in the tube. Through this study, the basic techniques of the numerical code for the multi-dimensional two-phase flow of the interior ballistics have been obtained.

  • PDF

Considerations for Design and Implementation of a RF Emitter Localization System with Array Antennas

  • Lim, Deok Won;Lim, Soon;Chun, Sebum;Heo, Moon Beom
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.1
    • /
    • pp.37-45
    • /
    • 2016
  • In this paper, design and implementation issues for a network-oriented RF emitter localization system with array antenna are discussed. For hardware, the problem of array mismatch and RF/IF channel mismatch are introduced and the calibration schemes for solving those problems are also provided. For software, it is explained how to overcome the drawback of conventional MUltiple Signal Identification and Classification (MUSIC) algorithm in a point of identifying the number of received signals and problems such as Data Association Problem and Ghost Node Problem in regard to multiple emitter localization are presented with some approaches for getting around those problems. Finally, for implementation, a criterion for arranging each of sensors and a requirement for alignment of array antenna' orientation are also given.

Inverse Synthetic Aperture Radar Imaging Using Stepped Chirp Waveform (계단 첩 파형(Stepped Chirp Waveform)을 이용한 ISAR 영상 형성)

  • Lee, Seong-Hyeon;Kang, Min-Suk;Park, Sang-Hong;Shin, Seung-Yong;Yang, Eunjung;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.9
    • /
    • pp.930-937
    • /
    • 2014
  • Inverse synthetic aperture radar (ISAR) images can be generated by radar which radiates the electromagnetic wave to a target and receives signal reflected from the target. ISAR images can be widely used to target detection and recognition. This paper proposed a method of generation of high resolution ISAR images by synthesizing frequency spectrums of each stepped chirp waveform in one burst and sub-sampling in frequency domain. This process is performed over entire bursts during coherent processing interval. Conventional ISAR image generation method using stepped frequency waveform has a severe problem of short unambiguous range, loading to ghost phenomenon. However, this problem can be resolved by the proposed method. In simulations, we generate high resolution ISAR image of the moving target which is Boeing-737 aircraft model composed of several ideal point scatterers.