• Title/Summary/Keyword: We 수

Search Result 85,967, Processing Time 0.084 seconds

Wideband WDM Transmission through the Power Symmetry Method in the Mid-Span Spectral Inversion (Mid-Span Spectral Inversion을 이용한 광 펄스 왜곡의 보상에서 전력 대칭을 통한 광대역 WDM 전송)

  • 이성렬;이윤현
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.7
    • /
    • pp.1157-1166
    • /
    • 2001
  • In this paper, we investigated the degree of compensation for optical pulse shape distortion due to both chromatic dispersion and SPM(self phase modulation) in high speed optical transmission system with dispersion shift fiber. We adopted the power symmetric MSSI(mid-span spectral inversion) as compensation method. We used EOP(eye-opening penalty) parameter in order to evaluate the compensation efficiency of distorted optical pulse. We evaluated input signal power range being able to maintain stable reception performance in the case of various chirp parameter of modulated optical pulse. And, in order to verify the applicable to wideband WDM system, we evaluated the wavelength range being able to maintain stable reception performance through the EOP calculation of various dispersion coefficient of first fiber D$\_$11/. We showed that proposed MSSI is effective compensation method to down chirped optical pulse transmission rather than up chirped optical pulse transmission in anomalous dispersion range. And we showed that this method have possibility of relative high power transmission and wideband transmission in WDM system.

  • PDF

3D Facial Modeling and Synthesis System for Realistic Facial Expression (자연스러운 표정 합성을 위한 3차원 얼굴 모델링 및 합성 시스템)

  • 심연숙;김선욱;한재현;변혜란;정창섭
    • Korean Journal of Cognitive Science
    • /
    • v.11 no.2
    • /
    • pp.1-10
    • /
    • 2000
  • Realistic facial animation research field which communicates with human and computer using face has increased recently. The human face is the part of the body we use to recognize individuals and the important communication channel that understand the inner states like emotion. To provide the intelligent interface. computer facial animation looks like human in talking and expressing himself. Facial modeling and animation research is focused on realistic facial animation recently. In this article, we suggest the method of facial modeling and animation for realistic facial synthesis. We can make a 3D facial model for arbitrary face by using generic facial model. For more correct and real face, we make the Korean Generic Facial Model. We can also manipulate facial synthesis based on the physical characteristics of real facial muscle and skin. Many application will be developed such as teleconferencing, education, movies etc.

  • PDF

FRACTAL DIMENSION AND MAXIMUM SUNSPOT NUMBER IN SOLAR CYCLE (태양주기별 흑점수의 프랙탈 차원과 최대흑점수의 상관관계)

  • Kim R.S.;Yi Y.;Cho K.S.;Moon Y.J.;Kim S.W.
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.3
    • /
    • pp.227-236
    • /
    • 2006
  • The fractal dimension is a quantitative parameter describing the characteristics of irregular time series. In this study, we use this parameter to analyze the irregular aspects of solar activity and to predict the maximum sunspot number in the following solar cycle by examining time series of the sunspot number. For this, we considered the daily sunspot number since 1850 from SIDC (Solar Influences Data analysis Center) and then estimated cycle variation of the fractal dimension by using Higuchi's method. We examined the relationship between this fractal dimension and the maximum monthly sunspot number in each solar cycle. As a result, we found that there is a strong inverse relationship between the fractal dimension and the maximum monthly sunspot number. By using this relation we predicted the maximum sunspot number in the solar cycle from the fractal dimension of the sunspot numbers during the solar activity increasing phase. The successful prediction is proven by a good correlation (r=0.89) between the observed and predicted maximum sunspot numbers in the solar cycles.

Portability Evaluation Technique of Application for Heterogeneous Mobile Platform (이기종 모바일 플랫폼에 애플리케이션 이식성 평가 기법)

  • Park, Hae-Yoon;Yoo, Hae-Young
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.123-132
    • /
    • 2011
  • However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. However a mobile application has limited compatibility to other platforms and device. So a mobile application should be rebuilt as particular restrictions of platforms or mobile phones when the mobile application is reused for other platforms. This paper ascertains problems when a mobile application is transplanted for reusing into other platforms, and suggests to evaluation systems of portability's quality that we can check the portability convenience of the existing mobile application. As we confirm its grade that shows convenience of suggested portability, we are able to check problems issued when a mobile application implants to other platforms. Then it is expected that we can check capability of rebuilding and endeavor rate. Also if the method will be considered at the first step of designing a mobile application, it will be the best way to develop the better mobile application that we can easily implant many other mobile platforms.

Framework of File System Robustness Test (FORT : 파일 시스템 강인성 테스트 프레임 워크)

  • Kim, Young-Jin;Won, You-Jip;Kim, Ra-Kie;Lee, Mo-Won;Park, Jae-Seok;Lee, Joo-Wheun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.348-366
    • /
    • 2007
  • Capacity of modem storage devices is becoming larger than yesterday and integration of disk is increasing. It refers that physical errors can damage a lot of digital information on storage devices. So we propose file system test framework in this paper to test integrity and robustness of file systems. We develop the tool for generating bad sectors on disks and the tool which creates all physical errors defined in storage devices. We also develop the tool for immediately monitoring the condition of read and write execution on storage devices. So, by integrating those tools, we develop FORT, test framework for confirming robustness of file system. We analyze robustness of ext3 file systems by FORT. Lastly, we present draft of intelligent system merging file system and device driver's layer architecture.

Development of a Model-Driven Approach Based API Translator for Embedded Software (모델 기반 접근 방법을 이용한 임베디드 S/W를 위한 API 변환기의 개발)

  • Park, Byeong-Ryul;Maeng, Ji-Chan;Lee, Jong-Bum;Ryu, Min-Soo;Ahn, Hyun-Sik;Jeong, Gu-Min
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.4
    • /
    • pp.272-278
    • /
    • 2007
  • In this paper, we present an automated API translator for embedded software development based on a model-driven approach. Since MDA(Model Driven Architecture) provides little support for the development of embedded software, we propose a new method which contains the MDA's advantage, automation of implement process, and can solve the problem of real-time overhead. First, we define 'generic APIs' which do not depend on any RTOS's but provide most of typical RTOS services. We can describe RTOS-related behaviors of target application using these generic APIs in a CIC(Common Intermediate Code). Then, we propose a transformation tool for translating a CIC using generic APIs into a C-code for specific RTOS. The proposed API translator converts them into C-code using XML transformation rule which is defined outside. It indicates that an API translator extends to other RTOS's by modifying or adding the transformation rule. From the experiment, we validate the proposed method.

  • PDF

A Study of Ultra Wideband Impulse Radio Systems for Multiple Access Communication (다원접속 통신을 위한 초광대역 임펄스 무선 전송 시스템 연구)

  • 이양선;강희조;문용규;양승인
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3C
    • /
    • pp.224-231
    • /
    • 2003
  • In this paper we proposed system parameter values of ultra-wideband Impulse Radio systems for the frequency band(3.1~10.6GHz), which is allocated by Federal Communications Commission(FCC). We also analyzed performance of the proposed system in the multiple access interference environment. According to result, application of possible pulse duration($t_{n}$) is very limited by 0.04~0.0326 ns in permission frequency range that establish in FCC. In the case of the same pulse signal power, we could know that system performance was changed by pulse repetition number($N_{s}$ ) regardless of pulse duration. Thus, We could know that we have to need duration of monocycle pulse and setting of frame un it time(Τ$_{f}$ ) according to multi user numbers and design proper pulse repetition number by transfer rate in multiple access systems design. In the IR system that needs high speed transmission more than 50 Mbps in multiple access interference environment, we could know that very serious performance decrease by multiple access interference happens. Therefore, as the design of high speed multiple access IR system, it should be designed to additional improvement techniques that can remove multiple access interference at the same time.

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

Analysis of Stepped T-Junction using Improved Three Plane Mode Matching Method and Its Application (개선된 Three Plane Mode Matching Method를 이용한 계단형 T-접합의 해석과 응용)

  • 손영일;김상태;황충선;백락준;신철재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1123-1133
    • /
    • 1999
  • In this paper, we applied mode matching and generalized scattering matrix methods to three plane mode matching method for analyzing T-junctions. We calculated all scattering matrix elements by only three times and considered several incident modes. By proposed analysis method, we could analyze various waveguide discontinuity structures more conveniently and accurately. Using the stepped T-junction, we would be able to reduce the reflection coefficient at an input port and use it over wider band. Simulated and HFSS data of T-junctions are compared, showing good agreement for scattering matrix elements. Considering step numbers, height, length and position, we extracted for optimum dimensions and equivalent circuit parameters.

  • PDF

Switching Function Implementation based on Graph (그래프에 기초한 스위칭함수 구현)

  • Park, Chun-Myoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1965-1970
    • /
    • 2011
  • This paper proposes the method of switching function implementation using switching function extraction based on graph over finite fields. After we deduce the matrix equation from path number of directional graph, we propose the switching function circuit algorithm, also we propose the code assignment algorithm for nodes which is satisfied the directional graph characteristics with designed circuits. We can implement more optimal switching function compare with former algorithm, also we can design the switching function circuit which have any natural number path through the proposed switching function circuit implementation algorithms. Also the proposed switching function implementation using graph theory over finite fields have decrement number of input-output, circuit construction simplification, increment arithmetic speed and decrement cost etc.