• Title/Summary/Keyword: Lock-in Technique

Search Result 152, Processing Time 0.028 seconds

Hybrid Genetic Algorithms with Conditional Local Search

  • Yun, Young-Su;Seo, Seung-Lock;Kim, Jong-Hwan;Chiung Moon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.183-186
    • /
    • 2003
  • Hybrid genetic algorithms (HGAs) have been studied as various ways. These HGAs usually use both the global search property of genetic algorithm (GA) and the local search one of local search techniques. One of the general types, when constructing HGAs, is to incorporate a local search technique into GA loop, and then the local search technique is repeated as many iteration number as the loop. This paper proposes a new HGA with a conditional local search technique (c-HGA) that does not be repeated as many iteration number as GA loop. For effectiveness of the proposed c-HGA, a conventional HGA and GA are also suggested, and then these algorithms are compared with each other in numerical examples,

  • PDF

Low Speed Weigh-In Motion System Using Multi-FBG Sensors (다중 광섬유 브라그 격자 센서를 적용한 저속용 자동계중 시스템)

  • Lee Hojoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.1
    • /
    • pp.21-28
    • /
    • 2004
  • We have demonstrated a low speed weigh-in motion system using FBG sensors and performed field test at a trial road. Technique, called identical chirped grating interrogation, have used for a demodulation relying on the mismatching of two identical broadband chirped gratings. We compensated the fluctuation of LED power and the temperature of sensor and used a lock-in amplifier to reduce effect of noise. We could design a bending plate that the measurement results are independent of position of weight. The FBG sensors weigh-in motion system showed linearity and reproducibility.

Infrared Thermography Characterization of Defects in Seamless Pipes Using an Infrared Reflector

  • Park, Hee-Sang;Choi, Man-Yong;Park, Jeong-Hak;Lee, Jea-Jung;Kim, Won-Tae;Lee, Bo-Young
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.32 no.3
    • /
    • pp.284-290
    • /
    • 2012
  • Infrared thermography uses infrared energy radiated from any objects above absolute zero temperature, and the range of its application has been constantly broadened. As one of the active test techniques detecting radiant energy generated when energy is applied to an object, ultrasound infrared thermography is a method of detecting defects through hot spots occurring at a defect area when 15~100 kHz of ultrasound is excited to an object. This technique is effective in detecting a wide range affected by ultrasound and vibration in real time. Especially, it is really effective when a defect area is minute. Therefore, this study conducted thermography through lock-in signal processing when an actual defect exists inside the austenite STS304 seamless pipe, which simulates thermal fatigue cracks in a nuclear power plant pipe. With ultrasound excited, this study could detect defects on the rear of a pipe by using an aluminium reflector. Besides, by regulating the angle of the aluminium reflector, this study could detect both front and rear defects as a single infrared thermography image.

Pseudo-Correlation-Function Based Unambiguous Tracking Technique for CBOC (6,1,1/11) Signals

  • Jeong, Gil-Seop;Kong, Seung-Hyun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.3
    • /
    • pp.107-114
    • /
    • 2015
  • Binary Offset Carrier (BOC) signal planned for future Global Navigation Satellite System (GNSS) provided better positioning accuracy and smaller multipath error than GPS C/A signal. However, due to the multiple side peaks in the auto-correlation function (ACF) of the BOC modulated signals, a receiver may false lock onto one of the side peaks in the tracking mode. This false lock would then result in a fatal tracking error. In this paper, we propose an unambiguous tracking method for composite BOC (CBOC) signals to mitigate this problem. It aims to reduce the side peaks of the ACF of CBOC modulated signals. It is based on the combination of traditional CBOC correlation function (CF) and reference CF of unmodulated pseudo- random noise code (PRN code). First, we present that cross-correlation function (CCF) with unmodulated PRN code is close to the secondary peaks of the traditional CBOC. Then, we obtain an unambiguous correlation function by subtracting traditional CBOC ACF from these CFs. Finally, the tracking performance for the CBOC signals is examined, and it is shown that the proposed method has better performance than the traditional unambiguous tracking method in additive white Gaussian noise (AWGN) channel.

Quantum Dot Based Mode-Locked Diode Lasers and Coherent Buried Heterostructure Photonic Crystal Nano Lasers

  • Kim, Ji-Myeong;Delfyett, Peter;Notomi, Masaya
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.122-122
    • /
    • 2013
  • In this talk, some optical properties of quantum dot based mode-locked diode lasers and photonic crystal nano lasers will be discussed. Linewidth enhancement factor, chirp and interband injection locking technique of quantum dot mode-locked lasers will be presented. Also various types of photonic crystal buried heterostructure lasers toward coherent nano laser will be covered as well.

  • PDF

Piecewise Phase Recovery Algorithm Using Block Turbo Codes for Next Generation Mobile Communications

  • Ryoo, Sun-Heui;Kim, Soo-Young;Ahn, Do-Seob
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.435-443
    • /
    • 2006
  • This paper presents an efficient carrier recovery algorithm combined with a turbo-coding technique in a mobile communication system. By using a block turbo code made up of independently decodable block codes, we can efficiently recover the fast time-varying carrier phase as well as correct channel errors. Our simulation results reveal that the proposed scheme can accommodate mobiles with high speed, and at the same time can reduce the number of iterations to lock the phase.

  • PDF

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

Algorithm and Data Structure for Improving of Operation Layer Performance in NETCONF Protocol (NETCONF 프로토콜의 오퍼레이션 계층 효율성 향상을 위한 자료 구조 및 알고리즘)

  • Lee, Yang-Min;Lee, Jae-Kee
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.543-548
    • /
    • 2014
  • Modern network has a complex structure that includes diverse and heterogeneous equipments to cope with multi-purpose functions. For proper administration of networks with complex structures, NETCONF protocol has been proposed. It still, however, has a few unresolved issues with each layer of the protocol. Tackling one of the less attended issues of NETCONF, this article suggests a technique which can efficiently update the configuration data of network equipments when multiple administrators are present. Specifically, for efficient updates of the network equipment configuration, we propose to add a pre-examination of the data dependent to algorithm in 오퍼레이션 layer and modify the data structure for managing XML documents for changing the configurations of network equipments. We have implemented and experimented with our method and confirmed that our approach brought an significant overall performance improvement to NETCONF.

Study on the Qualitative Defects Detection in Composites by Optical Infrared Thermography (적외선 열화상 기술을 이용한 복합재료의 결함 검출 정량화 연구)

  • Park, Hee-Sang;Choi, Man-Yong;Park, Jeong-Hak;Kim, Won-Tae;Choi, Won-Jong
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.31 no.2
    • /
    • pp.150-156
    • /
    • 2011
  • In this paper, infrared thermography measurement technique has been used to develop standard measurement technique for nondestructive testing of composite materials which is widely used in aerospace industries. To increase the defect detection rate, the related experiment used the lock-in IR-thermographiy method. Therefore it is of considerable interest in the field of non-destructive testing for fast discontinuity detection by using ultrasonic lock-in infrared thermography. The result also shows that as the investigation period of light source is lengthened according to the thickness of specimen, the possibility of detecting defects gets higher as well. However, the reason why the result values were not favorable when less than 50 mHz of light source was provided is because it was difficult to detect defects as the defect parts became a state of thermal equilibrium in general when thermal diffusivity affects the entire materials.

An UHISRL design to protect patient's privacy and to block its illegal access based on RFID (환자의 프라이버시 보호와 불법 접근 차단을 위한 RFID 기반 UHISRL 설계)

  • Lee, Byung Kwan;Jeong, Eun Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2014
  • This paper proposes the UHISRL(Ubiquitous Healthcare Information System based on Real Time Location) which manages patient, doctor, medicine by using RFID. The proposed UHISRL monitors the patient's health state, and enables us to confirm the result with Smart Phone and Tablet PC. Also, it can block Replay and Spoofing attack by using the ERHL(Extended Randomized Hash Lock) authentication scheme designed in this paper. A patient privacy is enhanced by limiting UHISRL DB access according to attributes with CP-ABE (Cipher Text - Attributed based Encryption) technique. Specially, UHISRL can prevent an unexpected accident by monitoring a chronic patient's emergency situation in real time.