• Title/Summary/Keyword: Multiple signature processing.

Search Result 20, Processing Time 0.027 seconds

Monolith and Partition Schemes with LDA and Neural Networks as Detector Units for Induction Motor Broken Rotor Bar Fault Detection

  • Ayhan Bulent;Chow Mo-Yuen;Song Myung-Hyun
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.5B no.2
    • /
    • pp.103-110
    • /
    • 2005
  • Broken rotor bars in induction motors can be detected by monitoring any abnormality of the spectrum amplitudes at certain frequencies in the motor current spectrum. Broken rotor bar fault detection schemes should rely on multiple signatures in order to overcome or reduce the effect of any misinterpretation of the signatures that are obscured by factors such as measurement noises and different load conditions. Multiple Discriminant Analysis (MDA) and Artificial Neural Networks (ANN) provide appropriate environments to develop such fault detection schemes because of their multi-input processing capabilities. This paper describes two fault detection schemes for broken rotor bar fault detection with multiple signature processing, and demonstrates that multiple signature processing is more efficient than single signature processing.

A Development of the Analysis Technique for Radar Target Signature and the Sofware using RCS/ISAR (RCS/ISAR를 이용한 레이다 표적분석 기법 및 소프트웨어 개발)

  • Kwon Kyoung-IL;Yoo Ji-Hee;Chung Myung-Soo;Yoon Taehwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.7 no.2 s.17
    • /
    • pp.88-99
    • /
    • 2004
  • A development of a software on radar target signature analysis is presented in this paper The target signature includes Radar Cross Section(RCS) prediction, Range Profile(RP) processing and Inverse Synthetic Aperture Radar(ISAR) processing. Physical Optics(PO) is the basic calculation method for RCS prediction and Geometrical Optics(GO) is used for ray tracing in the field calculation of multiple reflection. For RP and ISAR, Fast Fourier Transform(FFT) and Matrix Pencil(MP) method were implemented for post-processing. Those results are integrated into two separate softwares named as Radar Target Signature Generator(RTSG) and Radar Target Signature Analyser(RTSA). Several test results show good performances in radar signature prediction and analysis.

Multiple Signature Comparison of LogTM-SE for Fast Conflict Detection (다중 시그니처 비교를 통한 트랜잭셔널 메모리의 충돌해소 정책의 성능향상)

  • Kim, Deok-Ho;Oh, Doo-Hwan;Ro, Won-W.
    • The KIPS Transactions:PartA
    • /
    • v.18A no.1
    • /
    • pp.19-24
    • /
    • 2011
  • As era of multi-core processors has arrived, transactional memory has been considered as an effective method to achieve easy and fast multi-threaded programming. Various hardware transactional memory systems such as UTM, VTM, FastTM, LogTM, and LogTM-SE, have been introduced in order to implement high-performance multi-core processors. Especially, LogTM-SE has provided study performance with an efficient memory management policy and a practical thread scheduling method through conflict detection based on signatures. However, increasing number of cores on a processor imposes the hardware complexity for signature processing. This causes overall performance degradation due to the heavy workload on signature comparison. In this paper, we propose a new architecture of multiple signature comparison to improve conflict detection of signature based transactional memory systems.

Performance Analysis of DCMP and ZF based on Spatial Channel Response Estimation by ESPRIT (ESPRIT에 의한 공간 채널응답 추정치에 기초를 둔 방향구속 전력 최소화법과 제로포싱 알고리즘의 성능평가)

  • 정중식;임정빈;안영섭
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.11a
    • /
    • pp.169-174
    • /
    • 2002
  • It has known that the DCMP(Directionally Constrained Minimization of power)and the ZF(Zero Forcing) can improve the SINR performance of an array antenna system by using spatial signature of wireless channel. This paper analyzes performance of DCMP and ZF in multiple scattering environments. To obtain the spatial signature of wireless channel. bothe DOA(Directional of Arrival) and AS(Angular Spread) of the received signals were estimated by using ESPRIT. The performance of the DCMP and the ZF was analyzed theoretically. Through computer simulation, the SINR performance were evaluated.

  • PDF

Performance Analysis of Blind Channel Estimation for Precoded Multiuser Systems

  • Xu, Zhengyuan
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.189-198
    • /
    • 2002
  • Precoder has been shown to be able to provide source diversity and design flexibility. In this paper we employ precoding techniques for block transmission based on a multirate filterbank structure. To accommodate multiuser communication with variable data rates, different precoders with corresponding coefficients and up/down sampling rates are used. However, due to unknown multipath distortion, different interferences may exist in the received data, such as multiuser interference, intersymbol interference and interblock interference. To estimate channel parameters for a desired user, we employ all structured signature waveforms associated with different symbols of that user and apply subspace techniques. Therefore better performance of channel estimator can be achieved than the conventional subspace method based only on the signature of the current symbol. The delay for that user can also be jointly estimated. Channel identifiability conditions and asymptotic channel estimation error are investigated in detail. Numerical examples are provided to justify the proposed method. gest either multicode (MC) or multiple processing gain (MPG) mechanism [2], while requiring data rates to be integral multiples of some basic low-rate. In order to support variable rate transmission however, a comprehensive scheme needs to be investigated.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

A Study on Variant Malware Detection Techniques Using Static and Dynamic Features

  • Kang, Jinsu;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.882-895
    • /
    • 2020
  • The amount of malware increases exponentially every day and poses a threat to networks and operating systems. Most new malware is a variant of existing malware. It is difficult to deal with numerous malware variants since they bypass the existing signature-based malware detection method. Thus, research on automated methods of detecting and processing variant malware has been continuously conducted. This report proposes a method of extracting feature data from files and detecting malware using machine learning. Feature data were extracted from 7,000 malware and 3,000 benign files using static and dynamic malware analysis tools. A malware classification model was constructed using multiple DNN, XGBoost, and RandomForest layers and the performance was analyzed. The proposed method achieved up to 96.3% accuracy.

ECoMOT : An Efficient Content-based Multimedia Information Retrieval System Using Moving Objects' Trajectories in Video Data (ECoMOT : 비디오 데이터내의 이동체의 제적을 이용한 효율적인 내용 기반 멀티미디어 정보검색 시스템)

  • Shim Choon-Bo;Chang Jae-Woo;Shin Yong-Won;Park Byung-Rae
    • The KIPS Transactions:PartB
    • /
    • v.12B no.1 s.97
    • /
    • pp.47-56
    • /
    • 2005
  • A moving object has a various features that its spatial location, shape, and size are changed as time goes. In addition, the moving object has both temporal feature and spatial feature. It is one of the highly interested feature information in video data. In this paper, we propose an efficient content-based multimedia information retrieval system, so tailed ECoMOT which enables user to retrieve video data by using a trajectory information of moving objects in video data. The ECoMOT includes several novel techniques to achieve content-based retrieval using moving objects' trajectories : (1) Muitiple trajectory modeling technique to model the multiple trajectories composed of several moving objects; (2) Multiple similar trajectory retrieval technique to retrieve more similar trajectories by measuring similarity between a given two trajectories composed of several moving objects; (3) Superimposed signature-based trajectory indexing technique to effectively search corresponding trajectories from a large trajectory databases; (4) convenient trajectory extraction, query generation, and retrieval interface based on graphic user interface

Performance Analysis of DCMP and ZF based on Spatial Channel Response Estimation by ESPRIT (ESPRIT에 의한 공간 채널응답 추정치에 기초를 둔 방향구속 전력 최소화법과 제로포싱 알고리즘의 성능평가)

  • Jeong, Jung-Sik;Yim, Jeong-Bin;Ahn, Young-Sup
    • Journal of Navigation and Port Research
    • /
    • v.26 no.5
    • /
    • pp.543-548
    • /
    • 2002
  • It has been known that the DCMP(Directionally Constrained Minimization of Power) and the ZF(Zero Forcing) can improve the SINR performance of an array antenna system by using spatial signature of wireless channel. This paper analyzes the performance of DCMP and ZF in multiple scattering environments. To obtain the spatial signature of wireless channel. both DOA(Directional of Arrival) and AS(Angular spread) of the received signals were estimated by using ESPRIT. The performance of the DCMP and the ZF was analyzed theoretically. By computer simulation of SINR performance was evaluated.

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF