• Title/Summary/Keyword: Variable-Fixing

Search Result 44, Processing Time 0.029 seconds

A Parallel Collaborative Sphere Decoder for a MIMO Communication System

  • Koo, Jihun;Kim, Soo-Yong;Kim, Jaeseok
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.620-626
    • /
    • 2014
  • In this paper, we propose a parallel collaborative sphere decoder with a scalable architecture promising quasi-maximum likelyhood performance with a relatively small amount of computational resources. This design offers a hardware-friendly algorithm using a modified node operation through fixing the variable complexity of the critical path caused by the sequential nature of the conventional sphere decoder (SD). It also reduces the computational complexity compared to the fixed-complexity sphere decoder (FSD) algorithm by tree pruning using collaboratively operated node operators. A Monte Carlo simulation shows that our proposed design can be implemented using only half the parallel operators compared to the approach using an ideal fully parallel scheme such as FSD, with only about a 7% increase of the normalized decoding time for MIMO dimensions of $16{\times}16$ with 16-QAM modulation.

Numerical Design Optimization of Mooring Dolphin of Steel Pile Type (강관말뚝식 계류돌핀의 수치적 설계최적화)

  • 이나리;류연선;김정태;서경민
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1998.04a
    • /
    • pp.237-244
    • /
    • 1998
  • Optimum design of mooring dolphin is numerically investigated. Design optimization problem of mooring dolphin is first formulated. Geometry and cross sections of piles are used as design variables. Design objective is the total weight of steel piles of mooring dolphin and the constraints of stress, penetration depth, lower and upper bounds on design variables are imposed. Based on the design variable linking and fixing, several class of design variations are sought. For the numerical optimization, both PLBA( Pshenichny-Lim-Belegundu-Arora) program and DNCONF subroutine code in IMSL library are used. For a dolphin with 20 steel piles, vertical and inclined, optimum designs for different cases are successfully obtained, which can be applied for the mooring of a large floating structure.

  • PDF

An Adaptive Steganography of Optical Image using Bit-Planes and Multi-channel Characteristics

  • Kang, Jin-Suk;Jeong, Taik-Yeong T.
    • Journal of the Optical Society of Korea
    • /
    • v.12 no.3
    • /
    • pp.136-146
    • /
    • 2008
  • We proposed an adaptive steganography of an optical image using bit-planes and multichannel characteristics. The experiment's purpose was to compare the most popular methods used in optical steganography and to examine their advantages and disadvantages. In this paper we describe two digital methods: the first uses less significant bits(LSB) to encode hidden data, and in the other all blocks of $n{\times}n$ pixels are coded by using DCT(Digital Cosine Transformation), and two optical methods: double phase encoding and digital hologram watermarking with double binary phase encoding by using IFTA(Iterative Fourier Transform Algorithm) with phase quantization. Therefore, we investigated the complexity on bit plane and data, similarity insert information into bit planes. As a result, the proposed method increased the insertion capacity and improved the optical image quality as compared to fixing threshold and variable length method.

Column Generation Approach to the Constraint Based Explicit Routing Problem in MPLS Based IP Networks (MPLS 기반 IP 방에서 열생성 기법을 이용한 경로 설정 해법)

  • Kim Deokseong;Park Sungsoo
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.410-417
    • /
    • 2002
  • We consider the constraint based explicit routing problem in MPLS based IP Network. In this problem, we are given a set of traffic demands and a network with different link capacities. The problem is to assign the demand commodities to the paths in the network while minimizing the maximum link load ratio. We formulate this problem as an integer programming problem and propose an efficient column generation technique. To strengthen the formulation, we consider some valid inequalities. We also incorporate the column generation technique with variable fixing scheme Computational results show that the algorithm gives high quality solutions in a short execution time.

  • PDF

Fast Response Technique 2 Quadrant DC Motor Speed Control

  • W. Piyarat;V. Tipsuwanporn;W. Sawangsinkasikit;Lee, M. lajindarairerk;P. Thepsatorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1999.10a
    • /
    • pp.244-247
    • /
    • 1999
  • This paper presents a methodology of the technique for controlling DC motor drive by implementation of 2-quadrant operating mode which can ensure the torque controlling and speed with response time less than 2 seconds at all loading conditions. By implementation of BRM technique, energy is fed with definite values of BRM 256 bits, with different patterns of high accuracy, and fixing scan time at 0.667 ms, the ripple is less than 1%, thus high efficiency can be achieved, from the consequence of the accuracy of energy feeding at low current. The stability of the whole system can be determined from circle criterion by root locus method . The instant reverse direction of rotation can be done by decreasing the energy to the lowest level while motor is running with no load and variable load at the speed about 100-120 rpm and 50-60 rpm.

  • PDF

Quantification of Hydrated Products by Thermal Analysis of Cement Admixture Mixed Cement Paste (혼화재 혼입 시멘트 페이스트의 열분석을 통한 수화생성물 정량화)

  • Park, Dong-Cheon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.174-175
    • /
    • 2022
  • The blast furnace slag, which is widely used as a cement admixture, has latent hydraulics under the influence of cement hydrate, and fly ash and silica fume mainly cause a pozolane reaction. As a result, the cement structure becomes dense, and it is possible to compensate for defects when concrete is usually made with portland cement alone. When fixing carbon dioxide through reaction with carbon dioxide, the amount of calcium hydroxide in the cement paste is important. The larger the amount of calcium hydroxide, the more active the reaction may occur. It is also an important variable in calculating the depth of neutralization through carbonization. In this study, calcium hydroxide in cement paste using mixed materials was quantified through thermal analysis.

  • PDF

A Practical Procedure for the Design Optimization of Pile-type Substructure in a Mooring Dolphin (계류돌핀의 말뚝형 하부구조에 대한 실용적 설계 최적화 과정)

  • Ryu, Yeon-Sun;Lee, Nary;Kim, Jeong-Tae;Cho, Hyun-Ma
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.13 no.3
    • /
    • pp.285-294
    • /
    • 2000
  • In this paper, a practical procedure for the design optimization of tubular-steel-pile-type substructure in a mooring dolphin is investigated and numerically evaluated. In the finite-dimensional optimum design formulation, geometry and cross-sectional shapes of classified group of piles are identified as design variables. The design objective is the total weight of piles, and the design constraints on stresses, penetration depth, and size limits are imposed. Several classes of practical design alternatives are sought through the linking and fixing of design variables. Among the available numerical optimization codes, both PLBA program and DNCONF subroutine in IMSL library are used. They are based on SQP algorithm and relatively easy to get. A dolphin of numerical example has 20 tubular steel piles, 4 vertical and 16 inclined. Optimum designs for different cases are successfully obtained for the practical purpose.

  • PDF

An Analysis Methodology for Probabilistic Specification and Execution Prediction for Improving of Reliability of Fault-Tolerant Real-Time Systems (내고장 실시간 시스템의 신뢰도 향상을 위한 확률 명세 및 실행 예측 분석 방법)

  • Lee, Chol;Lee, Moon-Kun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.926-939
    • /
    • 2002
  • The formal specification methods with probability have been demanded in the area of fault real-time systems, in order to specify the uncertainty that the systems can encounter during their execution due to various environmental factors. This paper presents a new formal method with probability. namely Probabilistic Abstract Timed Machine (PATM), in order to analyze and predict system's behavior in dynamical environmental changes, This method classifies the factors into two classes: the variable and the constant. The analysis of system's behavior is performed on the probabilistic reachability graph generated from the ATM specification for the system. The analysis can predict any possibility that the behavior may not satisfy some safety requirements of the system, indicate which variable factors cause such satisfaction, and further recover from this unsatisfying fault state by fixing the variable factors. Consequently the reliability to the fault real-time systems can be improved.

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Design of a FRP Deck Using Topology and Shape Optimization (위상과 형상최적화 기법을 사용한 FRP 교량 바닥판의 설계)

  • Lee, Eun-Hyung;Park, Jae-Gyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.22 no.5
    • /
    • pp.501-507
    • /
    • 2009
  • By using topology and shape optimization, a theoretically optimum FRP deck was proposed. Firstly, a topologically optimal shape, truss-like structure without hinges, was found. A truss-shape frame is the most ideal structure when subjected to a concentrated force at the center of simply supported beam. An armature was found at the point joining horizontal chord and diagonal chord, which was used as a new design variable. Secondly, optimum value of each variable was decided through shape optimization using genetic algorithm. To compare it with existing commercial FRP decks, shape optimization was performed by fixing the height of FRP decks. To verify the performance of the FRP deck proposed in this study, a finite element analysis was performed. As a result, it satisfies serviceability and safety guide lines of FRP decks.