• Title/Summary/Keyword: Z변환

Search Result 195, Processing Time 0.023 seconds

Digital Simulation of Linear systems with Bandlimited Random Inputs (제한 대역 랜덤 입력을 가진 선형 시스템의 디지털 시뮬레이션)

  • 김영균
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.19 no.3
    • /
    • pp.1-4
    • /
    • 1982
  • The purpose of this paper is to find and compare efficient and "statistically accurate" algorithms for linear systems with bandlimited random inputs. Using the previously investigated truncated expansions[2], a new state-transition algorithm is derived. With statistical error criteria (mean-square error), comparative study on the Performances has been done for the first and second-order linear system models. The results show that a new bandlimited state-transition algorithm works better than any commonly used algorithms (e. g., first-order state-transition method or Z-transform method).

  • PDF

Analysis of Electromagnetic Phenomena and Vibration of BLDC Motor by Permanent Magnet Overhang (영구자석 오버행에 의한 BLDC Motor의 전자기적 현상 및 진동특성 해석)

  • Kang, Gyu-Hong;Kim, Duck-Hyun;Kim, Gyu-Tak
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.55 no.11
    • /
    • pp.564-571
    • /
    • 2006
  • In this paper, the estimation of Z-axis thrust ripple and vibration of BLDC motor with asymmetrical permanent magnet overhang is performed by 3-D Finite Element Method (3-D FEM) and vibration experimentation. The ripple of Z-axis thrust is due to armature reaction field in BLDC motor driven to squire wave. That is generating to Z-axis vibration. The analysis results of Z-axis thrust and the vibration by Z-axis thrust ripple is validated by comparison with experimental result.

Image Compression with using Wavelet Conversion Coefficients of Zerotree (웨이블렛 변환 계수의 제로트리를 이용한 영상압축)

  • Seo, Han-Seog;Park, Se-Won;Yim, Hwa-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.55-62
    • /
    • 2012
  • EZW, also known as Embedded Zerotree Wavelet, is a technique that allows transforming original images into wavelet, then again compressing images using the transformed data. This algorithm demonstrates a simple structure and remarkable effectiveness. This paper has reformed the EZW to improve a compression efficiency. Fundamentally, EZW evaluates the priority level of wavelet-transformed data and stores them into four different categories considering the priority level of the data as well as their location information. The four categories are represented as the symbols P, N, Z, and T. Here, P and N correspond to the volume of data and the priority level whereas Z and T show the location information of data. Each letter is stored through the process of dominant pass. However, here is when the data of Z and T are stored redundantly which lead to unnecessary increase of data volume. In this paper, we propose a modified version of Embedded Zerotree Wavelet algorithm, which is designed to efficiently reduce the volume of redundantly stored data using four additionally inserted symbols. We name it EEZW, Extended Embedded Zerotree Wavelet. The proposed algorithm demonstrates the efficiency verified by a number of image and confirms an outstanding result through the PSNR(Peak Signal To Noise Rate) values, which measure their quality of images.

The analysis of the Type-1 positioning servomechanism by the Z-transform method (Z-변환법에 의한 제1형위치 써어보메카니슴의 해석)

  • 한만춘;임광선
    • 전기의세계
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 1968
  • A typical type-1 positioning servomechanism is theoretically analyzed as a multirate sampled-data system which contains two or more signals sampled at different rates by the Z-transform method. And also it is analyzed as a continuous system by using the Younsei 101 Electronic Analog Computer. Comparing the solution of the multirate sampled data system with that of the continuous system to a step input, it is concluded that the response time of the output of the multirate sampled-data system is reduced by a multirate controller, the ripple between samples is lessened and all the transients are diminished within one period.

  • PDF

Techniques to Transform Object-oriented Design into Component-based Design Formal Specifications using Formal Specifications (객체지향 설계에서 정형명세를 이용한 컴포넌트 설계로의 변환 기법)

  • 신숙경;이종국;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.883-900
    • /
    • 2004
  • As object-oriented development technology that increases extensibility and reusability has been widely spread, it can shorten development period and enhance quality by reusing verified object-oriented artifacts. Thus we can construct high quality component-based system at short time transforming component-based model using verified object-oriented artifacts. In this paper, we propose techniques to transform available object-oriented design model into component-based model using formal specification techniques in order to increase accuracy of transformation. First, formal specification language for component is defined for formal specification of component-based design. And, techniques for formal specification of object-oriented design using Object-Z, a formal specification language, is proposed in structural, functional, and dynamic aspects. Next, we present techniques for transforming formal specification of object-oriented design into formal specification of component-based design. Through a case study we apply the proposed transformation techniques and show the transformation process of object-oriented formal specification into component-based formal specification.

A Security Software Development Methodology Using Formal Verification Tools (정형 검증 도구를 이용한 보안 소프트웨어 개발 방안)

  • Jang, Seung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.141-148
    • /
    • 2006
  • This paper suggests method of safe security S/W by verifying and its result of formal verification tool. We will survey many formal verification tools and compare features of these tools. And we will suggest what tool is appropriate and methodogoly of developing safe security S/W. The Z/EVES is the most appropriate tool. This paper proposes formal verification of ACS by using RoZ tool which is formal verification tool to create UML model. The specification and verification are executed using Z/EVES tool. These procedures can find weak or wrong point of developed S/W.

Analytic Problems of the Properties of the Modified z-Transform (Modified z-변환의 성질상의 해석적 문제점)

  • Chung, Tae-Sang;Chang, Tae-Gyu;Lee, Young-Un;Kim, Hyung-Joon
    • Proceedings of the KIEE Conference
    • /
    • 1996.11a
    • /
    • pp.39-41
    • /
    • 1996
  • While the z-transform method is a basic mathematical tool to relate the signals only at the sampling instants in analyzing and designing sampled-data control systems, the modified z-transform which is a variation of the z-transform is widely used to represent the details of continuous signals between the sampling instants. Regarding the modified z-transform method, some properties were established to relate the modified z-transform to the regular z-transform. This paper will show that these properties, in their current forms, cause some analytic problems, when they are applied to the signals with discontinuities at the sampling instants, which accordingly limit their applications significantly. In this paper, those analytic problems will be investigated, and the theorems of the modified z-transform will be revised by adopting a new notation so that those can be correctly interpreted and used without any analytic problems in the analysis of sampled data systems. Also some useful schemes of applying the modified z-transform will be developed.

  • PDF

Study on Z specification for S/W Safety of Computer Based Interlocking Systems (전자연동장치 S/W 안전성 확보를 위한 Z 방법표현에 관한 연구)

  • Ahn, Jin;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2017
  • Railway interlocking systems which are safety-critical systems are rapidly changed from relay-based systems to computer-based systems which have high flexible. Computer-based interlocking systems (CBI) are consisted of hardware and software in which system safeties arise one of important problems. The interlocking software of the CBI influences directly to the system safeties. "z" notation is one of formal methods have been used for system software specification to secure system safety. In this paper, the specification of interlocking logics for CBI systems is realized using "z" notation and verifies it with Z/EVES.

A Study on Public Key Knapsack Cryptosystem for Security in Computer Communication Networks (컴퓨터 통신 네트워크의 보안성을 위한 공개키 배낭 암호시스템에 대한 연구)

  • Yang Tae-Kyu
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.129-137
    • /
    • 2002
  • In this paper, a public key knapsack cryptosystem algorithm is based on the security to a difficulty of polynomial factorization in computer communication networks is proposed. For the proposed public key knapsack cryptosystem, a polynomial vector Q(x,y,z) is formed by transform of superincreasing vector P, a polynomial g(x,y,z) is selected. Next then, the two polynomials Q(x,y,z) and g(x,y,z) is decided on the public key. The enciphering first selects plaintext vector. Then the ciphertext R(x,y,z) is computed using the public key polynomials and a random integer $\alpha$. For the deciphering of ciphertext R(x,y,z), the plaintext is determined using the roots x, y, z of a polynomial g(x,y,z)=0 and the increasing property of secrety key vector. Therefore a public key knapsack cryptosystem is based on the security to a difficulty of factorization of a polynomial g(x,y,z)=0 with three variables. The propriety of the proposed public key cryptosystem algorithm is verified with the computer simulation.

  • PDF

Mobile LCD Characterization using XYZ Electro-Optical Transfer Functions for RGBCMYK Components (RGBCMYK 성분의 XYZ 전광 변환 함수를 이용한 모바일 LCD의 특성화)

  • Park, Kee-Hyon;Kwon, Oh-Seol;Son, Chang-Hwan;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.6 s.312
    • /
    • pp.1-10
    • /
    • 2006
  • Most display characterization methods, such as the gain-offset-gamma (GOG) model and S-curve model, generally assume that displays have two fundamental characteristics, channel -chromaticity-constancy and channel-independence. However, these assumptions are not so applicable in the case of liquid crystal (LC)-based mobile displays. Accordingly, modifications are required to enable the application of conventional display characterization methods to mobile displays. Therefore, this study proposes the modeling of distinct EOTFs in terms of the X, Y, and Z values for each channel to consider the differences among the EOTFs resulting from channel-chromaticity-inconstancy. In addition, to overcome the poor additivity property among the channels due to channel-interaction, the proposed method also models and uses the EOTFs of the X, Y, and Z values for the inter-channel components cyan, magenta, yellow, and gray Experimental results confirm that the mobile display color values predicted by the proposed characterization method are more accurate than those predicted by other characterization methods due to considering the channel-chromaticity-inconstancy and/or channel-dependence of the display.