• Title/Summary/Keyword: Time delay method

Search Result 2,314, Processing Time 0.027 seconds

Distinction and Tracking of Multiple Pingers Using a Single Frequency (단일 주파수에 의한 복수의 초음파 핑거의 식별 및 추적)

  • 신현옥
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.26 no.4
    • /
    • pp.360-364
    • /
    • 1990
  • To testy time division scheme, we performed some experiments in a circular water tank(13m in diameter and 1m deep). A result of that is shown in figure 4. The 2-dimensional position of the pinger was calculated by the method of hyperbolic line of position calculation. The resolution of the time difference on the base line is 2.5cm. In experiments, the multiple pingers of a single frequency were distinguished and tracked successfully. When the experiment is carried out in the water tank, some multi-path pulses always occur. To delete it, several 10 ms of time delay is inserted onto the program after a group of the normal signals are received. Some normal pulses are not received by the time delay, however there is no problem, practically, for the distinction and the tracking of the pulse. In 2-dimensional positioning, the pinger position can be calculated with three hydrophones. However, if four hydrophones are available, the positioning accuracy will be higher than three hydrophones only by some techniques. Another good feature of the use of four hydrophones is that the positioning of the pinger is capable if a hydrophone fails in receiving them. We also tested this distinguishing method in the field using another type pingers(APPENDIXA).

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Development and Cost-effective Evaluation of Grass Blocks Minimizing Construction Waste (건설폐기물을 최소화한 비용 효율적 잔디 블록 기법 개발 및 평가)

  • Jeon, Minsu;Hong, Jungsun;Jeon, Jechan;Kim, Lee-Hyung
    • Journal of Wetlands Research
    • /
    • v.19 no.3
    • /
    • pp.359-365
    • /
    • 2017
  • Impermeable surfaces such as transportation land uses including roads and parking lots accumulate high heavy metals and particulate matters concentration especially during dry season which worsens the river water quality and distort the water circulation system during rainfall events. Recently, the government has been promoting policies to install Low Impact Development (LID) facilities such as permeable pavements or grass blocks in parking lots or pavements. However, transition of asphalt-paved surfaces to permeable pavement generated asphalt wastes which are detrimental to the environment and has cost implications due to its removal and disposal. Therefore this study was conducted to provide a method of constructing a cost-effective permeable pavement to reduce waste generation and cost. In this study, comparative analysis of the water circulation capacity and economic efficiency of the traditional construction method and new method proposed in this study through the lab-scale experiment. The proposed method was to make holes in existing asphalt pavements, layout geotextile fabric and permeable base media such as sand before compaction. After compaction, layout grass blocks on the compacted base media then layout sand in between each grass blocks before compaction. Apparently, there was no significant difference between the traditional installation method of permeable pavement and the proposed method in this study considering surface runoff, infiltrated volume, stored volume, and rainfall-runoff delay time. The proposed method in this study generated 86% less wastes compared to the traditional installation method and has 70% cost reduction considering asphalt removal and disposal. The construction method proposed in this study yielded similar performance compared to the traditional installation method and water circulation effect, but was proven to be less complicated and economical.

Development of CPLD technology mapping algorithm for Sequential Circuit under Time Constraint (시간제약 조건하에서 순차 회로를 위한 CPLD 기술 매핑 알고리즘 개발)

  • Youn, Chung-Mo;Kim, Hi-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.224-234
    • /
    • 2000
  • In this paper, we propose a new CPLD technology mapping algorithm for sequential circuit under time constraints. The algorithm detects feedbacks of sequential circuit, separate each feedback variables into immediate input variable, and represent combinational part into DAG. Also, among the nodes of the DAG, the nodes that the number of outdegree is more than or equal to 2 is not separated, but replicated from the DAG, and reconstructed to fanout-free-tree. To use this construction method is for reason that area is less consumed than the TEMPLA algorithm to implement circuits, and process time is improved rather than TMCPLD within given time constraint. Using time constraint and delay of device the number of partitionable multi-level is defined, the number of OR terms that the initial costs of each nodes is set to and total costs that the costs is set to after merging nodes is calculated, and the nodes that the number of OR terms of CLBs that construct CPLD is excessed is partitioned and is reconstructed as subgraphs. The nodes in the partitioned subgraphs is merged through collapsing, and the collapsed equations is performed by bin packing so that if fit to the number of OR terms in the CLBs of a given device. In the results of experiments to MCNC circuits for logic synthesis benchmark, we can shows that proposed technology mapping algorithm reduces the number of CLBs bu 15.58% rather than the TEMPLA, and reduces process time rather than the TMCPLD.

  • PDF

A Study on the Course Keeping Ability under Wave Condition Considering Ship's Maneuverability (조종성능을 고려한 파랑 중 선박의 직진성능에 관한 연구)

  • Kang, Dong-Hoon;Lee, Soon-Sup;Lee, Seung-Jae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.2
    • /
    • pp.193-199
    • /
    • 2013
  • Course keeping ability of ships under wave are analyzed with wave. The simulation with three degrees of freedom is developed and 3-D source distribution method is applied to get wave force for the simulation. The simulation is conducted with the restriction of maximum rudder angle and time delay of control and regular wave and irregular wave are considered as the source of external forces. Simulations with ships which have different maneuverability with tuned hydrodynamic coefficients are developed to assess the variation of the course keeping ability depending on the ship's maneuvering characteristics. The course Keeping ability is evaluated by comparison of distance while the ships are simulated with autopilot control.

Asynchronous and Adaptive Massage Passing Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 비동기 적응형 메시지 전달 기법)

  • Jeong, Jong-Kyun;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.3
    • /
    • pp.196-201
    • /
    • 2013
  • In this paper, we propose an asynchronous and adaptive message passing scheme based on S-MAC for handling with the problem on energy efficiency in wireless sensor networks. The proposed scheme consists of a policy that differentiate transmission errors caused by packet collision or radio interference from congestion errors caused by buffer overflow and a method that adaptively controls the size of a fragment according to the variance of traffic loads. Especially, it presents a method that highly reduce the energy consumption by keeping the size of fragment not being excessively smaller than the one that may result in rapid increment of the total transfer time. Finally, with the simulation results we show that network throughput and delay are improved by using the proposed message passing scheme.

Performance Comparison of Fast Distributed Video Decoding Methods Using Correlation between LDPCA Frames (LDPCA 프레임간 상관성을 이용한 고속 분산 비디오 복호화 기법의 성능 비교)

  • Kim, Man-Jae;Kim, Jin-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.31-39
    • /
    • 2012
  • DVC(Distributed Video Coding) techniques have been attracting a lot of research works since these enable us to implement the light-weight video encoder and to provide good coding efficiency by introducing the feedback channel. However, the feedback channel causes the decoder to increase the decoding complexity and requires very high decoding latency because of numerous iterative decoding processes. So, in order to reduce the decoding delay and then to implement in a real-time environment, this paper proposes several parity bit estimation methods which are based on the temporal correlation, spatial correlation and spatio-temporal correlations between LDPCA frames on each bit plane in the consecutive video frames in pixel-domain Wyner-Ziv video coding scheme and then the performances of these methods are compared in fast DVC scheme. Through computer simulations, it is shown that the adaptive spatio-temporal correlation-based estimation method and the temporal correlation-based estimation method outperform others for the video frames with the highly active contents and the low active contents, respectively. By using these results, the proposed estimation schemes will be able to be effectively used in a variety of different applications.

Reliability Improvement of the Industrial Equipment Control and Management System Using ZigBee Wireless Network Technology (ZigBee 무선 네트워크 기술을 이용한 산업용 장비 제어 및 관리 시스템의 신뢰성 향상)

  • Kim, Woo-Jin;Kang, Chul-Gyu;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.742-748
    • /
    • 2009
  • Zigbee wireless communication technology has features which are low cost, low power and coping ability against a high delay time when the automatic wireless system is manufactured. Therefore, in this paper, we research a method improving the data transmission reliability of the industrial equipment control and management system using zigbee wireless communication technology. we used a convolutional code with code rate R=1/2, constraint K=5 and generation polynomial constant g1=(10111) and g2=(10011) as a reliability method. From the transmission simulation at LOS environment, we are able to predict the transmission error performance according to the distance difference. Furthermore, At the PER performance analysis, we can get the result that this system reliability with convolutional code is improved about 5 times than the existing system. From these results, we can prove that the convolutional code is the solution to improve the system reliability of the industrial equipment control and management system using zigbee wireless communication technology.

  • PDF

Scheduling Algorithm for Military Satellite Networks using Dynamic WDRR(Weighted Deficit Round Robin) (군사용 위성통신망을 위한 동적 WDRR기반의 스케줄링 알고리즘)

  • Lee, Gi-Yeop;Song, Kyoung-Sub;Kim, Dong-Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.196-204
    • /
    • 2013
  • In this paper, a scheduling algorithm is proposed for military satellite networks to improve QoS(Quality of Service) based on WDRR(Weighted Deficit Round Robin) method. When the packet size that has been queued to be larger, the proposed scheme DWDRR(Dynamic WDRR) method give appropriate additional quantum using EWMA(Exponentially Weighted Moving Average). To demonstrate an usefulness of proposed algorithm using OPNET modeler that built the simulation environment, reliability and real-time availability of the proposed algorithm is analyzed. The simulation results show an availability of proposed scheme in terms of reduce queuing delay and packet drop rate compared and analyzed the existing algorithms WRR(Weighted Round Robin), DRR(Deficit Round Robin) and WDRR with DWDRR.

Design of High Speed Binary Arithmetic Encoder for CABAC Encoder (CABAC 부호화기를 위한 고속 이진 산술 부호화기의 설계)

  • Park, Seungyong;Jo, Hyungu;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.774-780
    • /
    • 2017
  • This paper proposes an efficient binary arithmetic encoder hardware architecture for CABAC encoding, which is an entropy coding method of HEVC. CABAC is an entropy coding method that is used in HEVC standard. Entropy coding removes statistical redundancy and supports a high compression ratio of images. However, the binary arithmetic encoder causes a delay in real time processing and parallel processing is difficult because of the high dependency between data. The operation of the proposed CABAC BAE hardware structure is to separate the renormalization and process the conventional iterative algorithm in parallel. The new scheme was designed as a four-stage pipeline structure that can reduce critical path optimally. The proposed CABAC BAE hardware architecture was designed with Verilog HDL and implemented in 65nm technology. Its gate count is 8.07K and maximum operating speed of 769MHz. It processes the four bin per clock cycle. Maximum processing speed increased by 26% from existing hardware architectures.