• Title/Summary/Keyword: T-Matching Network

Search Result 41, Processing Time 0.024 seconds

An Adaptive FEC Code Control Algorithm for Mobile Wireless Sensor Networks

  • Ahn Jong-Suk;Hong Seung-Wook;Heidemann John
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.489-498
    • /
    • 2005
  • For better performance over a noisy channel, mobile wireless networks transmit packets with forward error correction (FEC) code to recover corrupt bits without retransmission. The static determination of the FEC code size, however, degrades their performance since the evaluation of the underlying channel state is hardly accurate and even widely varied. Our measurements over a wireless sensor network, for example, show that the average bit error rate (BER) per second or per minute continuously changes from 0 up to $10^{-3}$. Under this environment, wireless networks waste their bandwidth since they can't deterministically select the appropriate size of FEC code matching to the fluctuating channel BER. This paper proposes an adaptive FEC technique called adaptive FEC code control (AFECCC), which dynamically tunes the amount of FEC code per packet based on the arrival of acknowl­edgement packets without any specific information such as signal to noise ratio (SNR) or BER from receivers. Our simulation experiments indicate that AFECCC performs better than any static FEC algorithm and some conventional dynamic hybrid FEC/ARQ algorithms when wireless channels are modeled with two-state Markov chain, chaotic map, and traces collected from real sensor networks. Finally, AFECCC implemented in sensor motes achieves better performance than any static FEC algorithm.

A Design of Dangerous Sound Detection Engine of Wearable Device for Hearing Impaired Persons (청각장애인을 위한 웨어러블 기기의 위험소리 검출 엔진 설계)

  • Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.7
    • /
    • pp.1263-1269
    • /
    • 2016
  • Hearing impaired persons are exposed to the danger since they can't be aware of many dangerous situations like fire alarms, car hones and so on. Therefore they need haptic or visual informations when they meet dangerous situations. In this paper, we design a dangerous sound detection engine for hearing impaired. We consider four dangerous indoor situations such as a boiled sound of kettle, a fire alarm, a door bell and a phone ringing. For outdoor, two dangerous situations such as a car horn and a siren of emergency vehicle are considered. For a test, 6 data sets are collected from those six situations. we extract LPC, LPCC and MFCC as feature vectors from the collected data and compare the vectors for feasibility. Finally we design a matching engine using an artificial neural network and perform classification tests. We perform classification tests for 3 times considering the use outdoors and indoors. The test result shows the feasibility for the dangerous sound detection.

Recognition of Handwritten Digits Based on Neural Network and Fuzzy Inference (신경회로망과 퍼지 추론에 의한 필기체 숫자 인식)

  • Ko, Chang-Ryong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.63-71
    • /
    • 2011
  • We present a method to modify the recognition of neural networks by the fuzzy inference in a handwritten digit recognition with large deformations, and we verified the method by the experiment. The neural networks take long time in learning and recognize 100% on the learning pattern. But the neural networks don't show a good recognition on the testing pattern. So, we apply the modified method as the fuzzy inference. As a result, the recognition and false recognition of neural networks was improved 90.2% and 9.8% respectively at 89.6% and 10.4% initially. This approach decreased especially the false recognition on digit 3, 5. We used the density of digit to extract the fuzzy membership function in this experiment. But, because the handwritten digit have varified input patterns, we will get a better recognition by extracting varifed characteristics and applying the composite fuzzy inference. We also propose the application of fuzzy inference on matching the input pattern, than applying strictly the fuzzy inference.

Design of Tag Antenna without Shadow Zone in Readable Pattern (인식 음영 구역을 제거한 RFID 태그 안테나 설계)

  • Cho, Chi-Hyun;Choo, Ho-Sung;Park, Ik-Mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.12 s.103
    • /
    • pp.1206-1212
    • /
    • 2005
  • In this paper, we propose a novel antenna structure which uses the electric and magnetic currents so as to eliminate nulls on their radiation pattern. The tag antenna was matched to the conjugate impedance of the commercial tag chip using the modified double T matching network. The radiation efficiency is about $90\%$, and the bandwidth($S_{11}< -10 dB$) is 848${\~}$926 MHz. Also it shows the gain deviation between the maximum and minimum gains about 4 dB at any direction of the tag antenna at the operating frequency. The readable range of the tag is 1.7${\~}$2.4 m for an arbitrary rotation angle of the tag with a commercial tag chip.

Landform and Drainage Analysis in Geoje-Do Using GIS (GIS를 이용한 거제도 지형 및 하계 분석)

  • Kim, Woo-Kwan;Lim, Yong-Ho
    • Journal of the Korean association of regional geographers
    • /
    • v.3 no.2
    • /
    • pp.19-35
    • /
    • 1997
  • The purpose of this study is to find out the characteristics of landform in Geoje-Do using GIS and DTED data. The characteristics of landform in Geoje-Do are as follows; First, the height-range of Geoje-Do is $0{\sim}580m$, and the average elevation of it is 124m. Volcanic and granite region is mainly appeared at high elevation-region. But, we can't find out outstanding difference of elevation, according to its geology. The second. the slope-range of Geoje-Do is $0{\sim}52$ degree, and the average slope of it is 17.6 degree. The slope of volcanic and granite area is more steeper than any other region. But the results of analysis of the geology in Geojo-Do, don't show outstanding difference of the slope. The third, the area-rate of the aspect of Geoje-Do is almost same in all direction. And the area-rate of south-west direction is the highest. According to the geology of Geoje-Do, granite is distributed the most widely, and the area of volcanic and granite occupy 60% of entire island's area. According to analysis of influence of geology with elevation, geology has little relationship with elevation. According to analysis of geology and drainage network, streams are inclined to be developed well in Alluvium area. Drainage network is well developed throughout the entire island, except southeast area. The highest order of stream is 4 in 1:25,000 topographic map. The density of stream in Geoje-Do is very high, such as 1.6. The bifurcation-ratio of stream is also higher than 4 in all order. The length-ratio of stream is ranged from 1.24 to 3.25. According to the relationship between order and elevation. order is the greater, elevation is the lower. According to the relationship between order and slope, order is the greater, slope is the gentler. In this study, we use DTED Data, and compare it with topographic map data. According to the comparison, there is a little difference between DTED data and topographic map data. Therefore, to use DTED data in landform analysis, it is required coordinate matching process. This process is very important, and take very long time. Thus, if you use DTED in landform analysis, some processes are required. DTED data can be taken very easily, but its using is not simple. Because coordinate adjust is very hard work.

  • PDF

A Filtering Technique of Streaming XML Data based Postfix Sharing for Partial matching Path Queries (부분매칭 경로질의를 위한 포스트픽스 공유에 기반한 스트리밍 XML 데이타 필터링 기법)

  • Park Seog;Kim Young-Soo
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.138-149
    • /
    • 2006
  • As the environment with sensor network and ubiquitous computing is emerged, there are many demands of handling continuous, fast data such as streaming data. As work about streaming data has begun, work about management of streaming data in Publish-Subscribe system is started. The recent emergence of XML as a standard for information exchange on Internet has led to more interest in Publish - Subscribe system. A filtering technique of streaming XML data in the existing Publish- Subscribe system is using some schemes based on automata and YFilter, which is one of filtering techniques, is very popular. YFilter exploits commonality among path queries by sharing the common prefixes of the paths so that they are processed at most one and that is using the top-down approach. However, because partial matching path queries interrupt the common prefix sharing and don't calculate from root, throughput of YFilter decreases. So we use sharing of commonality among path queries with the common postfixes of the paths and use the bottom-up approach instead of the top-down approach. This filtering technique is called as PoSFilter. And we verify this technique through comparing with YFilter about throughput.

Acoustic Event Detection and Matlab/Simulink Interoperation for Individualized Things-Human Interaction (사물-사람 간 개인화된 상호작용을 위한 음향신호 이벤트 감지 및 Matlab/Simulink 연동환경)

  • Lee, Sanghyun;Kim, Tag Gon;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2015
  • Most IoT-related approaches have tried to establish the relation by connecting the network between things. The proposed research will present how the pervasive interaction of eco-system formed by touching the objects between humans and things can be recognized on purpose. By collecting and sharing the detected patterns among all kinds of things, we can construct the environment which enables individualized interactions of different objects. To perform the aforementioned, we are going to utilize technical procedures such as event-driven signal processing, pattern matching for signal recognition, and hardware in the loop simulation. We will also aim to implement the prototype of sensor processor based on Arduino MCU, which can be integrated with system using Arduino-Matlab/Simulink hybrid-interoperation environment. In the experiment, we use piezo transducer to detect the vibration or vibrates the surface using acoustic wave, which has specific frequency spectrum and individualized signal shape in terms of time axis. The signal distortion in time and frequency domain is recorded into memory tracer within sensor processor to extract the meaningful pattern by comparing the stored with lookup table(LUT). In this paper, we will contribute the initial prototypes for the acoustic touch processor by using off-the-shelf MCU and the integrated framework based on Matlab/Simulink model to provide the individualization of the touch-sensing for the user on purpose.

A 900 MHz Zero-IF RF Transceiver for IEEE 802.15.4g SUN OFDM Systems

  • Kim, Changwan;Lee, Seungsik;Choi, Sangsung
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.352-360
    • /
    • 2014
  • This paper presents a 900 MHz zero-IF RF transceiver for IEEE 802.15.4g Smart Utility Networks OFDM systems. The proposed RF transceiver comprises an RF front end, a Tx baseband analog circuit, an Rx baseband analog circuit, and a ${\Delta}{\Sigma}$ fractional-N frequency synthesizer. In the RF front end, re-use of a matching network reduces the chip size of the RF transceiver. Since a T/Rx switch is implemented only at the input of the low noise amplifier, the driver amplifier can deliver its output power to an antenna without any signal loss; thus, leading to a low dc power consumption. The proposed current-driven passive mixer in Rx and voltage-mode passive mixer in Tx can mitigate the IQ crosstalk problem, while maintaining 50% duty-cycle in local oscillator clocks. The overall Rx-baseband circuits can provide a voltage gain of 70 dB with a 1 dB gain control step. The proposed RF transceiver is implemented in a $0.18{\mu}$ CMOS technology and consumes 37 mA in Tx mode and 38 mA in Rx mode from a 1.8 V supply voltage. The fabricated chip shows a Tx average power of -2 dBm, a sensitivity level of -103 dBm at 100 Kbps with PER < 1%, an Rx input $P_{1dB}$ of -11 dBm, and an Rx input IP3 of -2.3 dBm.

Implementation of an Embedded System for Image Tracking Using Web Camera (ICCAS 2005)

  • Nam, Chul;Ha, Kwan-Yong;;Kim, Hie-Sik
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1405-1408
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. In the past, user interface products with simple functions were commercialized .but now user demands are increasing and the system has more various applicable fields due to a high penetration rate of the Internet. Therefore, the demand for embedded system is tend to rise In this paper, we Implementation of an embedded system for image tracking. This system is used a fixed IP for the reliable server operation on TCP/IP networks. A real time broadcasting of video image on the internet was developed by using an USB camera on the embedded Linux system. The digital camera is connected at the USB host port of the embedded board. all input images from the video camera is continuously stored as a compressed JPEG file in a directory at the Linux web-server. And each frame image data from web camera is compared for measurement of displacement Vector. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The embedded board utilized the S3C2410 MPU Which used the ARM 920T core form Samsung. The operating system was ported to embedded Linux kernel and mounted of root file system. And the stored images are sent to the client PC through the web browser. It used the network function of Linux and it developed a program with protocol of the TCP/IP.

  • PDF

Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector (적응형 변형 인식부를 이용한 침입 탐지 학습알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Kim, Young-Soo;Lee, Se-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.451-456
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn't make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.