• Title/Summary/Keyword: Pseudo Code

Search Result 185, Processing Time 0.024 seconds

Incompressible/Compressible Flow Analysis over High-Lift Airfoils Using Two-Equation Turbulence Models (2-방정식 난류모델을 이용한 고양력 익형 주위의 비압축성/압축성 유동장 해석)

  • Kim C. S.;Kim C. A.;Rho O. H.
    • Journal of computational fluids engineering
    • /
    • v.4 no.1
    • /
    • pp.53-61
    • /
    • 1999
  • Two-dimensional, unsteady, incompressible and compressible Navier-Stokes codes are developed for the computation of the viscous turbulent flow over high-lift airfoils. The compressible code involves a conventional upwind-differenced scheme for the convective terms and LU-SGS scheme for temporal integration. The incompressible code with pseudo-compressibility method also adopts the same schemes as the compressible code. Three two-equation turbulence models are evaluated by computing the flow over single and multi-element airfoils. The compressible and incompressible codes are validated by predicting the flow around the RAE 2822 transonic airfoil and the NACA 4412 airfoil, respectively. In addition, both the incompressible and compressible code are used to compute the flow over the NLR 7301 airfoil with flap to study the compressible effect near the high-loaded leading edge. The grid systems are efficiently generated using Chimera overlapping grid scheme. Overall, the κ-ω SST model shows closer agreement with experiment results, especially in the prediction of adverse pressure gradient region on the suction surfaces of high-lift airfoils.

  • PDF

PN Code Acquisition at Low Signal-to-Noise Ratio Based on Seed Accumulating Sequential Estimation (시드 누적 순차적 추정 기법을 이용한 낮은 신호대잡음비 환경에서의 의사 잡음 부호 획득)

  • 윤석호;김선용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.678-683
    • /
    • 2003
  • The pseudo-noise (PN) code acquisition based on the sequential estimation (SE) proposed by Ward performs well only at relatively high chip signal-to-noise ratios (SNRs). In this paper, a seed accumulating sequential estimation (SASE) method and a PN code acquisition system based on it are proposed, which perform well at low chip SNR (of practical interest) also. Then, the mean acquisition time performance of the proposed system is investigated. Numerical results show that the system based on the SASE performs dramatically better than that based on the SE at low chip SNR, and the improvement becomes larger as the period of PN code increases.

A Study on the Recognition of Defected Fingerprint Using Chain Code (체인 코드를 이용한 훼손된 지문의 인식에 관한 연구)

  • 조민환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.63-68
    • /
    • 2003
  • Almost the system are usually taken by means of shapes and positions of ridge's end-points and bifurcation in the fingerprint recognition. but we studied about recognition of polluted fingerprint by chain code ridges. the results and sequence of processing are summarized as follows. (1)Capture several kinds of polluted fingerprint image. (2)Preprocessing(median filtering for removing noises, local and global histogram equalization, dilation and erosion, thinning and remove pseudo image), (3)Rebuild ridge line after Least Square Processing, (4)Compute distribution of chain code vector, (5)The results are almost same values of each vector of preprocessed fingerprint images. From the results, we can surmised more successful fingerprints recognition system in combination with other system by singular points

  • PDF

A Study on The Hybrid Acquisition Performance of MC DS-CDMA Over Multipath Fading Channel (다중경로 환경에서 MC DS-CDMA시스템의 직.병렬 혼합 동기 획득에 관한 연구)

  • Kim, Won-Sbu;Kim, Kyung-Won;Park, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1968-1976
    • /
    • 2007
  • This paper proposes a hybrid pseudo-noise (PN) code acquisition scheme for Multicarrier Direct Sequence - Code Division Multiple Access (MC DS-CDMA) mobile communication systems on the code acquisition performance for Nakagami-m fading channel. The hybrid acquisition scheme combines parallel search with serial search to cover the whole uncertainty region of the input code phase. It has a much simpler acquisition hardware structure than the total parallel acquisition and can achieve the mean acquisition time (MAT) slightly inferior to that of the total parallel acquisition. The closed-form expressions of the detection and false-alarm probabilities are derived.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Time Domain Acoustic Propagation Analysis Using 2-D Pseudo-spectral Modeling for Ocean Environment (해양환경에서 2차원 유사 스펙트럴 모델링을 이용한 시간 영역 음 전달 해석)

  • Kim Keesan;Lee Keunhwa;Seong Woojae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.23 no.8
    • /
    • pp.576-582
    • /
    • 2004
  • A computer code that is based on the Pseudo-spectral finite difference algorithm using staggered grid is developed for the wave propagation modeling in the time domain. The advantage of a finite difference approximation is that any geometrically complicated media can be modeled. Staggered grids are advantageous as it provides much more accuracy than using a regular grid. Pseudo-spectral methods are those that evaluate spatial derivatives by multiplying a wavenumber by the Fourier transform of a pressure wave-field and performing the inverse Fourier transform. This method is very stable and reduces memory and the number of computations. The synthetic results by this algorithm agree with the analytic solution in the infinite and half space. The time domain modeling was implemented in various models. such as half-space. Pekeris waveguide, and range dependent environment. The snapshots showing the total wave-field reveals the Propagation characteristic or the acoustic waves through the complex ocean environment.

Design of a Correlator and an Access-code Generator for Bluetooth Baseband (블루투스 기저대역을 위한 상관기와 액세스 코드 생성 모듈의 설계)

  • Hwang Sun-Won;Lee Sang-Hoon;Shin Wee-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.206-211
    • /
    • 2005
  • We describe the design for a correlator and an access code generator in bluetooth system. These are used for a connection setting, a packet decision and a clock synchronization between Bluetooth units. The correlator consists of two blocks; carry save adder based on Wallace tree and threshold-value decision block. It determines on an useful packet and clock-synchronization for input signal of 1.0Mbps through the sliding-window correlating. The access-code generator also consists of two blocks; BCH(Bose-Chadhuri-Hocquenghem) cyclic encoder and control block. It generates the access-codes according to four steps' generation process based on Bluetooth standard. In order to solve synchronization problem, we make use of any memory as a pseudo random sequence. The proposed correlator and access-code generator were coded with VHDL. An FPGA Implementation of these modules and the simulation results are proved by Xilinx chip. The critical delay and correlative margin based on synthesis show the 4.689ns and the allowable correlation-error up to 7-bit.

  • PDF

Supervisory Controller Design to Enforce Reversibility and Liveness in Colored Petri Nets

  • Aybar, Aydin;Cimen, Mustafa
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.4
    • /
    • pp.463-470
    • /
    • 2007
  • Colored Petri net model which is a model of discrete event systems is considered in this work. A supervisory controller which enforces reversibility and liveness simultaneously is presented. Furthermore, the algorithms, written by pseudo-code, are presented for the supervisory controller design. A program is developed to implement these algorithms.

Orbit Determination System for the KOMPSAT-2 Using GPS Measurement Data

  • Lee, Byoung-Sun;Yoon, Jae-Cheol;Kim, Jae-Hoon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2325-2330
    • /
    • 2003
  • GPS based orbit determination system for the KOMPSAT-2 has been developed. Two types of orbit determination software such as operational orbit determination and precise orbit determination are designed and implemented. GPS navigation solutions from on-board the satellite are used for the operational orbit determination and raw measurements data such as C/A code pseudo-range and L1 carrier phase for the precise orbit determination. Operational concept, architectural design, software implementation, and performance test are described.

  • PDF