• Title/Summary/Keyword: Smart Point

Search Result 875, Processing Time 0.035 seconds

Design of Multi-winding Inductor for Minimum Inductor Current Ripple Using Optimized Coupling Factor

  • Kang, Taewon;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2016.07a
    • /
    • pp.231-232
    • /
    • 2016
  • This paper investigates the design of multi-winding coupled inductor for minimum inductor current ripple. Based on the general circuit model of coupled inductor together with the operating principles of dc-dc converter, the relationship between the ripple size of inductor current and the coupling factor is derived under the different duty ratio. The optimal coupling factor of n-phase multi-winding coupled inductor which corresponds to a minimum inductor ripple current becomes -(1/n-1), i.e. a complete inverse coupling without leakage inductance, as the duty ratio of steady-state operating point approaches 1/n, 2/n, ${\cdots}$ or (n-1)/n. In an opposite manner, the optimal coupling factor value of zero, i.e. zero mutual inductance, is required when the duty ratio of steady-state operating point approaches either zero or one. Therefore, coupled inductors having optimal coupling factor can minimize the ripple current of inductor and inductor size.

  • PDF

Easy Keypad - Soft Keyboard for Login Information Input in Smart Devices (쉬운 키패드 - 스마트 기기에서 사용하는 로그인 정보 입력만을 위한 소프트키보드)

  • Koh, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.107-120
    • /
    • 2014
  • In this paper, we suggest a soft keyboard, called easy keypad, that we use only for login information input in smart devices. Especially, as easy keypad is applied to MTS(Mobile Trading System) we suggest easy keypad in MTS. Easy keypad UI in MTS represents 20 letters and users input login information by using 20 letters. We suggest protocol which decides letters represented in easy keypad UI, which is code for users to input login information by using 20 letters. We analyze easy keypad's safe degree for soft keyboard security threat, especially when it comes to point hacking, we suggest comparison among original soft keyboard's safe degree. Also we suggest mathematical fomula for measuring soft keyboard's convenience and then we analyze the result of soft keyboard's convenience by the presented mathematical formula.

Error Correction Technique of Distance Measurement for ToF LIDAR Sensor

  • Moon, Yeon-Kug;Shim, Young Bo;Song, Hyoung-Kyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.960-973
    • /
    • 2018
  • This paper presents design for error correcting algorithm of the time of flight (ToF) detection value in the light detection and ranging (LIDAR) system sensor. The walk error of ToF value is generated by change of the received signal power depending on distance between the LIDAR sensor and object. The proposed method efficiently compensates the ToF value error by the independent ToF value calculation from the received signal using both rising point and falling point. A constant error of ~0.05 m is obtained after the walk error correction while an increasing error up to ~1 m is obtained with conventional method.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Analysis of Generalized n-winding Coupled Inductor in dc-dc Converters

  • Kang, Taewon;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2017.07a
    • /
    • pp.88-89
    • /
    • 2017
  • This paper investigates the design of multi-winding coupled inductor for minimum inductor current ripple in rapid traction battery charger systems. Based on the general circuit model of multi-winding coupled inductor together with the operating principles of dc-dc converter, the relationship between the ripple size of inductor current and the coupling factor is derived under the different duty ratio. The optimal coupling factor which corresponds to a minimum inductor ripple current becomes -(1/n-1), i.e. a complete inverse coupling without leakage inductance, as the steady-state duty ratio operating point approaches 1/n, 2/n, … or (n1)/n. In an opposite manner, the optimal coupling factor value of zero, i.e. zero mutual inductance, is required when the steady-state duty ratio operating point approaches either zero or one.

  • PDF

A Nearly Optimal One-to-Many Routing Algorithm on k-ary n-cube Networks

  • Choi, Dongmin;Chung, Ilyong
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.9-14
    • /
    • 2018
  • The k-ary n-cube $Q^k_n$ is widely used in the design and implementation of parallel and distributed processing architectures. It consists of $k^n$ identical nodes, each node having degree 2n is connected through bidirectional, point-to-point communication channels to different neighbors. On $Q^k_n$ we would like to transmit packets from a source node to 2n destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $0{\leq}i{\leq}2n-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(n^3)$ routing algorithm on $Q^k_n$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

Design of Three-winding Coupled Inductor for Minimum Current Ripple in Battery Chargers

  • Kang, Taewon;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2015.07a
    • /
    • pp.195-196
    • /
    • 2015
  • This paper investigates the design of coupled inductor for minimum inductor current ripple in rapid traction battery charger systems. Based on the general circuit model of coupled inductor together with the operating principles of dc-dc converter, the relationship between the ripple size of inductor current and the coupling factor is derived under the different duty ratio. The optimal coupling factor which corresponds to a minimum inductor ripple current becomes -0.5, i.e. a complete inverse coupling without leakage inductance, as the steady-state duty ratio operating point approaches 1/3 or 2/3. In an opposite manner, the optimal coupling factor value of zero, i.e. zero mutual inductance, is required when the steady-state duty ratio operating point approaches either zero or one. Coupled inductors having optimal coupling factor can minimize the ripple current of inductor and battery current resulting in a reliable and efficient operation of battery chargers.

  • PDF

Multi-lane Detection using TPLF for Smart Navigation (스마트 내비게이션을 위한 TPLF 기반 다중차선 검출 기법)

  • Kim, Sungho;Kwon, Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.896-897
    • /
    • 2014
  • Multi-lane detection is useful for the smart navigation system. In this paper, a novel multi-lane detection method is presented. The proposed three point Laplacian filter (TPLF) can complement the weak points of the previous box filter and step filter. The experimental results validate the feasibility of the proposed multi-lane detection method.

  • PDF

Implementation of University Point Distributed System based on Public Blockchain (퍼블릭 블록체인기반 대학 포인트 분산 시스템 개발)

  • Jung, Se-Hoon;Kim, Jeong Hoon;Sim, Chun-Bo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.255-266
    • /
    • 2021
  • Most common web or application system architectures have central network. As a result, central network can be supervised and controlled in all situation. And It has the advantage of easy to manage and fast to work. However, central network have a disadvantage of weak to security and unclear. In particular, many institutions used by web system be has many problems by central network. In this paper, we proposed blokchain technology based on ethereum to resolve of problem and trading structure that arise in cental network. We propose a decentralized application based on points including cryptocurrency functions and smart contract to the advantages of blockchain with a decentralized structure. The results of the performance experiment are as follows; It has shown the advantages of reliable use and security in a variety of environments(Windows, Ubuntu, Mac).

Voronoi Diagram-based USBL Outlier Rejection for AUV Localization

  • Hyeonmin Sim;Hangil Joe
    • Journal of Ocean Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.115-123
    • /
    • 2024
  • USBL systems are essential for providing accurate positions of autonomous underwater vehicles (AUVs). On the other hand, the accuracy can be degraded by outliers because of the environmental conditions. A failure to address these outliers can significantly impact the reliability of underwater localization and navigation systems. This paper proposes a novel outlier rejection algorithm for AUV localization using Voronoi diagrams and query point calculation. The Voronoi diagram divides data space into Voronoi cells that center on ultra-short baseline (USBL) data, and the calculated query point determines if the corresponding USBL data is an inlier. This study conducted experiments acquiring GPS and USBL data simultaneously and optimized the algorithm empirically based on the acquired data. In addition, the proposed method was applied to a sensor fusion algorithm to verify its effectiveness, resulting in improved pose estimations. The proposed method can be applied to various sensor fusion algorithms as a preprocess and could be used for outlier rejection for other 2D-based location sensors.