• Title/Summary/Keyword: TABLE MANIPULATION

Search Result 29, Processing Time 0.024 seconds

Design and Comparison of Digital Predistorters for High Power Amplifiers (비선형 고전력 증폭기의 디지털 전치 보상기 설계 및 비교)

  • Lim, Sun-Min;Eun, Chang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.403-413
    • /
    • 2009
  • We compare three predistortion methods to prevent signal distortion and spectral re-growth due to the high PAPR (peak-to-average ratio) of OFDM signal and the non-linearity of high-power amplifiers. The three predistortion methods are pth order inverse, indirect learning architecture and look up table. The pth order inverse and indirect learning architecture methods requires less memory and has a fast convergence because these methods use a polynomial model that has a small number of coefficients. Nevertheless the convergence is fast due to the small number of coefficients and the simple computation that excludes manipulation of complex numbers by separate compensation for the magnitude and phase. The look up table method is easy to implement due to simple computation but has the disadvantage that large memory is required. Computer simulation result reveals that indirect learning architecture shows the best performance though the gain is less than 1 dB at $BER\;=\;10^{-4}$ for 64-QAM. The three predistorters are adaptive to the amplifier aging and environmental changes, and can be selected to the requirements for implementation.

A Basic Study of Food Exchange Database Construction and Search System (ENECC/E-Food Exchange) Based on Internet (인터넷 기반의 식품 교환량 데이터베이스 구축과 검색 시스템 (ENECC/E-Food Exchange)에 관한 기초 연구)

  • Hong, Sun-Myeong;Jo, Hui-Seon;Kim, Gon
    • Journal of the Korean Dietetic Association
    • /
    • v.9 no.2
    • /
    • pp.159-171
    • /
    • 2003
  • The food composition tables are frequently used to health and nutrition practices. But it is difficult to find out food exchange lists with food exchange groups in the food composition table. Over 2500 items and many kinds of nutrients are in the food composition table. But now food exchange lists are used a few foods. The internet demands the users needs for obtaining more food exchange lists and nutrient information from food composition. This basic study is to solve the users need and the supply more efficient and effective manipulation system for e-food exchange database construction and search system:ENECC/e-food exchnage(E-Nutrition Education and Couseling Center/e-food exchange). This paper introduces the food exchange database construction and search system(ENECC/e-food exchange) using the formula which calculates the food exchange quantity of 6 food exchange groups and added one extra groups(alcohol) based on the internet. The ENECC/e-food exchange database is basically based on the 6th food composition table(2001) of the National Rural Living Science Institution in Rural Development Administration, Korea. The e-food exchange database are consisted of 2,261 foods in 6 basic food groups and one extra groups by using ENECC calculating formula. Also, the e-food exchange database has the proximate composition, mineral and vitamin content such as energy, moisture, protein, fat, carbohydrate, ash, calcium, phosphorus, iron, sodium, potassium, retinol equivalent, retinol, â-carotene, thiamin, riboflavin, niacin, ascorbic acid, refuse per 100g of each food.

  • PDF

SNPAnalyzer: web-based workbench for the SNPs analysis

  • Yoo, Jin-Ho;Seo, Bong-Hee;Kim, Yang-Seok
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2003.10a
    • /
    • pp.236-244
    • /
    • 2003
  • Summary: The analysis of human genetic variation is one of the key issues far the understanding of the different drug response among individuals and many programs are developed for this purpose. However, current publicly available programs have so many limitations such as time complexity problem for the analysis of large amount of alleles or SNPs, difficult manipulation for installation, data import, and usage, and low-quality visual output. Here we present workbench for SNP anlaysis, SNPAnalyzer. SNPAnalyzer consists of 3 main modules: 1)Hardy-Weinberg Equilibrium ,2) Haplotype Estimation, and 3) Linkage Disequilibrium. Each module has several different widely-used algorithms for the extensive analysis and can handle large amount of alleles and SNPs with simple format. Analysis results are displayed in user-friendly formats such as table, graph and map. SNPAnalyzer is developed using C and C$^{++}$ and users can easily access through web-interftce. Availability: SNPAnalyzer can be freely implemented at http://www.istech.info/istech/board/login_form.jsp

  • PDF

An Automated Process Selection and Sequencing Method in Computer-Aided Process Planning (자동공정설계(自動工程設計)에서 가공작업(加工作業)의 선정(選定) 및 순서결정(順序決定) 기법(技法)의 개발(開發))

  • Cho, Kyu-Kab;Kim, In-Ho;Rho, Hyung-Min
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.15 no.2
    • /
    • pp.45-55
    • /
    • 1989
  • This paper deals with development of a computer-aided process selection and sequencing technique and its software for metal cutting processes of rotational parts. The process selection procedure consists of selection for proper machining operations and machine tools suitable for the selected operations. Machining operations are selected based on machining surface features and machine tools are selected by employing a conversion table which converts machining operations into machine tools. The process sequence is determined by the proper manipulation of the precedence relation matrix. A computer program for the proposed technique is developed by using Turbo-Pascal on IBM PC/AT compatible system. The proposed technique works well to real problems.

  • PDF

A Study on Open Software based IP Network System Practice Platform and Practicing Scenario (공개 소프트웨어 기반 IP 네트워크 시스템 실습 플랫폼 및 실습 시나리오)

  • Kim, Tae-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.106-114
    • /
    • 2020
  • It is very important for beginners in networking to build, test, and operate an IP network system, which is the key infrastructure of the fourth industrial revolution. An IP network system consists of the IP network itself, covering both the internet and underlying layers, plus the basic network system supporting fundamental network services, with a DNS, the DHCP, email, WWW, and application service systems, such as VoIP. This paper suggests an open software-based practice platform with a minimal network configuration on which beginners can practice on nearly all of the IP network system, and it presents a practice scenario and results. In addition, it adds both IP address allocation and routing table manipulation functions to the network simulator software, which will allow beginners to learn table-based datagram routing schemes in advance. This platform may be useful for networking beginners in order to practice on an IP network system on their own personal computers without additional equipment and costs.

Cutter Runout Elimination in End Milling through Two-Axes PI Force Control (엔드밀 가공에서 2축 절사력 PI 제어를 통한 커터 런아웃 제거에 관한 연구)

  • Noh, Jong-Ho;Hwang, Joon;Liang, Steven Y.;Chung, Eui-Sik
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.6
    • /
    • pp.83-89
    • /
    • 1999
  • This paper presents the in-process runout compensation methodology to improve the surface quality of circular contouring cut in end milling process. The runout compensation system is based on the manipulation of workpiece position relative to cutter in minimizing the cutting force oscillation at spindle frequency. the basic concept of this approach is realized on a end milling machine whose machining table accommodates a set of orthogonal translators perpendicular to the spindle axis. The system performed that measuring the runout related cutting force component, formulating PI controlling commands, and the manipulating the workpiece position to counteract the variation of chip load during the circular contouring cut. To evaluate the runout compensation system performance, experimental study based on the implementation of two-axes PI force control is presented in the context of cutting force regulation and part surface finish improvement.

  • PDF

An Efficient Thumbnail Extraction Method in H.264/AVC Bitstreams (H.264/AVC 비트스트림에서 효율적으로 축소 영상을 추출 하는 방법)

  • Yu, Sang-Jun;Yoon, Myung-Keun;Kim, Eun-Seok;Sohn, Chae-Bong;Sim, Dong-Gyu;Oh, Seoung-Jun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.222-235
    • /
    • 2008
  • Recently, as growing of high definition media services like HDTV and IPTV, fast moving picture manipulation techniques need to meet what those services require. Especially, a fast reduced-size image extracting method is required in the areas of video indexing and video summary Conventional DC image extracting methods, however, can't be applied to H.264/AVC streams since a spatial domain prediction scheme is adopted in H.264/AVC intra mode. In this paper, we propose a theoretical method for extracting a thumbnail image from an H.264/AVC intra frame in the frequency domain. Furthermore, the proposed scheme can extract the thumbnail very fast since all operations are applied to transform coefficients directly, after a general equation for the thumbnail extraction in nine H.264/AVC intra prediction modes is introduced, an LUT(Look Up Table) for each mode is designed. Through the implementation and performance evaluation, while the subject quality difference between the output of our scheme and a conventional output is negligible, the former can extract the thumbnail faster then the latter by up to 63%.

An Efficient H.264/AVC Entropy Decoder Design (효율적인 H.264/AVC 엔트로피 복호기 설계)

  • Moon, Jeon-Hak;Lee, Seong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.12
    • /
    • pp.102-107
    • /
    • 2007
  • This paper proposes a H.264/AVC entropy decoder without embedded processor nor memory fabrication process. Many researches on H.264/AVC entropy decoders require ROM or RAM fabrication process, which is difficult to be implemented in general digital logic fabrication process. Furthermore, many researches require embedded processors for bitstream manipulation, which increases area and power consumption. This papers proposes hardwired H.264/AVC entropy decoder without embedded processor, which improves data processing speed and reduces power consumption. Furthermore, its CAVLC decoder optimizes lookup table and internal buffer without embedded memory, which reduces hardware size and can be implemented in general digital logic fabrication process without ROM or RAM fabrication process. Designed entropy decoder was embedded in H.264/AVC video decoder, and it was verified to operate correctly in the system. Synthesized in TSMC 90nm fabrication process, its maximum operation frequency is 125MHz. It supports QCIF, CIF, and QVGA image format. Under slight modification of nC register and other blocks, it also support VGA image format.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Managing and Modeling Strategy of Geo-features in Web-based 3D GIS

  • Kim, Kyong-Ho;Choe, Seung-Keol;Lee, Jong-Hun;Yang, Young-Kyu
    • Proceedings of the KSRS Conference
    • /
    • 1999.11a
    • /
    • pp.75-79
    • /
    • 1999
  • Geo-features play a key role in object-oriented or feature-based geo-processing system. So the strategy for how-to-model and how-to-manage the geo-features builds the main architecture of the entire system and also supports the efficiency and functionality of the system. Unlike the conventional 2D geo-processing system, geo-features in 3B GIS have lots to be considered to model regarding the efficient manipulation and analysis and visualization. When the system is running on the Web, it should also be considered that how to leverage the level of detail and the level of automation of modeling in addition to the support for client side data interoperability. We built a set of 3D geo-features, and each geo-feature contains a set of aspatial data and 3D geo-primitives. The 3D geo-primitives contain the fundamental modeling data such as the height of building and the burial depth of gas pipeline. We separated the additional modeling data on the geometry and appearance of the model from the fundamental modeling data to make the table in database more concise and to allow the users more freedom to represent the geo-object. To get the users to build and exchange their own data, we devised a file format called VGFF 2.0 which stands for Virtual GIS File Format. It is to describe the three dimensional geo-information in XML(eXtensible Markup Language). The DTD(Document Type Definition) of VGFF 2.0 is parsed using the DOM(Document Object Model). We also developed the authoring tools for. users can make their own 3D geo-features and model and save the data to VGFF 2.0 format. We are now expecting the VGFF 2.0 evolve to the 3D version of SVG(Scalable Vector Graphics) especially for 3D GIS on the Web.

  • PDF