• Title/Summary/Keyword: all-pass systems

Search Result 90, Processing Time 0.025 seconds

Improvement of Group Delay and Reduction of Computational Complexity in Linear Phase IIR Filters

  • Varasumanta, Saranuwaj;Sookcharoenphol, Dolchai;Sriteraviroj, Uthai;Janjitrapongvej, Kanok;Kanna, Channarong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.955-959
    • /
    • 2003
  • A technique for realizing linear phase IIR filters has been proposed by Powell-Chau which gives a real-time implementation of H(z-1).H(z), where H(z) is a causal nonlinear phase IIR filter. Powell-Chau system is linear but not timeinvariant system. Therefore, that system has group delay response that exhibits a minor sinusoidal variation superimposed on a constant value. In the signal processing, this oscillation seriously degrade the signal quality. Unfortunately, that system has a large sample delay of 4L and also more computational complexity. Proposed system is present a reduced computational complexity technique by moved the numerator polynomial of H(1/z) out to cascade with causal filter H(z) and remain only all-pole of H(1/z), then applied truncated infinite impulse response to finite with truncated IIR filtel $H_L$(z) and L sample delay to subtract the output sequence from the top and bottom filter. Proposed system is linear time invariance and group delay response and total harmonic distortion are also improved.

  • PDF

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.

On-the -fly Detection of the First Races for Shared-Memory Parallel Programs with Ordered Synchronization (순서적 동기화를 포함하는 공유 메모리 병렬프로그램에서의 수행중 최초경합 탐지 기법)

  • Park, Hui-Dong;Jeon, Yong-Gi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.884-894
    • /
    • 1999
  • 순서적 동기화 및 내포 병렬성을 포함하는 공유메모리 병렬 프로그램에서의 경합(race)은 프로그램 수행에서 원하지 않은 비결정성(nondeterminism)을 야기할 수 있기 때문에 반드시 탐지되어져야 한다. 특히 프로그램 수행에서 최초경합(first race)을 탐지하는 것은 중요한데, 그 이유는 이 경합을 제거하면 다른 경합이 나타나지 않을 수도 있기 때문이다. 본 논문에서는 결정적 공유메모리 병렬프로그램을 위한 2단계 수행중 (two-pass on-the-fly) 최초경합 탐지 기법을 제시하며, 이것은 공유메모리 병렬 프로그램의 특정 수행에서 "최초로 발생되는" 경합들을 탐지하는 기법이다. 그리고 HPF 컴파일러를 이용하여 본 탐지 프로토콜을 공인된 벤치마크 프로그램에 적용하여, 병렬 프로그램 디버깅 시 고려하여야 할 파라미터들에 대한 실험으로부터 본 기법의 효율성을 보였다.Abstract Detecting races is important in debugging shared-memory parallel programs which have ordered synchronization and nested parallelism, because the races result in unintended non- deterministic executions of the programs. The first races are important in debugging, because the removal of such races may make other races disappear. It is even possible that all races reported would disappear once the first races are removed. This paper presents a new two-pass on-the-fly algorithm to detect the first races in such parallel programs. The algorithm reported in this paper is an on-the-fly algorithm that detects the races that "occur first" in a particular execution of shared-memory parallel programs. The experiment has accomplished, where two certified benchmark programs which can be executed under High Performance Fortran environments to get some parameters which improve debugging performance with our algorithm. with our algorithm.

Fuzzy Algorithm Development for the Integration of Vehicle Simulator with All Terrain Unmanned Vehicle (험로 주행용 무인차량과 차량 시뮬레이터의 융합을 위한 퍼지 알고리즘 개발)

  • Yun, Duk-Sun;Yu, Hwan-Sin;Lim, Ha-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.2
    • /
    • pp.47-57
    • /
    • 2005
  • In this research, the main theme is the system integration of driving simulator and unmanned vehicle. The total system is composed of the mater system and the slave system. The master system has a cockpit system and the driving simulator. The slave system means an unmanned vehicle, which is composed of the actuator system the sensory system and the vision system. The communication system is composed of RS-232C serial communication system which combines the master system with the slave system. To integrate both systems, the signal classification and system characteristics considered DSP(Digital Signal Processing) filter is designed with signal sampling and measurement theory. In addition, to simulate the motion of tele-operated unmanned vehicle on the driving simulator, the classical washout algorithm is applied to this filter, because the unmanned vehicle does not have a limited working space, while the driving simulator has a narrow working space and it is difficult to cover all the motion of the unmanned vehicle. Because the classical washout algorithm has a defect of fixed high pass later, fuzzy logic is applied to reimburse it through an adaptive filter and scale factor for realistic motion generation on the driving simulator.

  • PDF

Generalized K Path Searching in Seoul Metropolitan Railway Network Considering Entry-Exit Toll (진입-진출 요금을 반영한 수도권 도시철도망의 일반화 K-경로탐색)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.1-20
    • /
    • 2022
  • The basic way to charge vehicles for using road and public transport networks is the entry-exit toll system. This system works by reading Hi-Pass and public transportation cards of the vehicles using card readers. However, the problems of navigating a route in consideration of entry-exit toll systems include the non-additive costs of enumerating routes. This problem is known as an NP-complete task that enumerates all paths and derives the optimal path. So far, the solution to the entry-exit toll system charging has been proposed in the form of transforming the road network. However, unlike in the public transport network where the cards are generalized, this solution has not been found in situations where network expansion is required with a transfer, multi-modes and multiple card readers. Hence, this study introduced the Link Label for a public transportation network composed of card readers in which network expansion is bypassed in selecting the optimal path by enumerating the paths through a one-to-one k-path search. Since the method proposed in this study constructs a relatively small set of paths, finding the optimal path is not burdensome in terms of computing power. In addition, the ease of comparison of sensitivity between paths indicates the possibility of using this method as a generalized means of deriving an optimal path.

Enhancement of Power System Transient Stability and Power Quality Using a Novel Solid-state Fault Current Limiter

  • Fereidouni, A.R.;Vahidi, B.;Mehr, T. Hoseini;Doiran, M. Garmroodi
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.4
    • /
    • pp.474-483
    • /
    • 2011
  • Solid-state fault current limiters (SSFCL) in power systems are alternative devices to limit prospective short circuit currents from reaching lower levels. Fault current limiters (FCL) can be classified into two categories: R-type (resistive) FCLs and L-type (inductive) FCLs. L-type FCL uses an inductor to limit fault level and is more efficient in suppressing voltage drop during a fault. In contrast, R-type FCL is constructed with a resistance and is more effective in consuming the acceleration energy of generators during a fault. Both functions enhance the transient stability of the power system. In the present paper, a novel SSFCL is proposed to enhance power system transient stability and power quality. The proposed SSFCL uses both functions of an L-type and R-type FCL. SSFCL consists of four diodes, one self-turn-off IGCT, a current-limiting by-pass inductor (L), and a variable resistance parallel with an inductor for improvement of power system stability and prevention of over-voltage across SSFCL. The main advantages of the proposed SSFCL are the simplicity of its structure and control, low steady-state impedance, fast response, and the existence of R-type and Ltype impedances during the fault, all of which improve power system stability and power quality. Simulations are accomplished in PSCAD/EMTDC.

One-to-One Disjoint Path Covers in Recursive Circulants (재귀원형군의 일대일 서로소인 경로 커버)

  • 박정흠
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.691-698
    • /
    • 2003
  • In this paper, we propose a problem, called one-to-one disjoint path cover problem, whether or not there exist k disjoint paths joining a pair of vertices which pass through all the vertices other than the two exactly once. A graph which for an arbitrary k, has a one-to-one disjoint path cover between an arbitrary pair of vertices has a hamiltonian property stronger than hamiltonian-connectedness. We investigate this problem on recursive circulants and prove that for an arbitrary k $k(1{\leq}k{\leq}m)$$ G(2^m,4)$,$m{\geq}3$, has a one-to-one disjoint path cover consisting of k paths between an arbitrary pair of vortices.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

Converter Control for APU of 8200 Series Electric Locomotive using Advanced Single Phase PLL Control Method (진보된 단상 PLL 제어방법을 이용한 8200호대 전기기관차 보조전원장치용 컨버터 제어)

  • Jung, No-Geon;Lee, Eul-Jae;Kim, Jae-Moon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.211-215
    • /
    • 2017
  • The APF (All Pass Filter) method that utilizes the computational power of the controller is most commonly used. However, since the calculation of the filter coefficient is complicated, the calculation is carried out in advance. It is difficult to apply it to the frequency fluctuation environment because the coefficient value is fixed. In this paper, a new control method of single phase PLL that can be usefully used in PWM converter device for electric railway was explained. Comparison and examination of similarities and differences between the conventional APF method PLL controller method and the newly proposed modified MA filter method PLL technique were performed. The possibility of implementation of the modified MA filter method through computer simulation was analyzed. In conclusion, the method proposed as the conclusion was applied to the APU(Auxiliary Power System) of 8200 Series Electric Locomotive and its usefulness was confirmed.

HHT method for system identification and damage detection: an experimental study

  • Zhou, Lily L.;Yan, Gang
    • Smart Structures and Systems
    • /
    • v.2 no.2
    • /
    • pp.141-154
    • /
    • 2006
  • Recently, the Hilbert-Huang transform (HHT) has gained considerable attention as a novel technique of signal processing, which shows promise for the system identification and damage detection of structures. This study investigates the effectiveness and accuracy of the HHT method for the system identification and damage detection of structures through a series of experiments. A multi-degree-of-freedom (MDOF) structural model has been constructed with modular members, and the columns of the model can be replaced or removed to simulate damages at different locations with different severities. The measured response data of the structure due to an impulse loading is first decomposed into modal responses using the empirical mode decomposition (EMD) approach with a band-pass filter technique. Then, the Hilbert transform is subsequently applied to each modal response to obtain the instantaneous amplitude and phase angle time histories. A linear least-square fit procedure is used to identify the natural frequencies and damping ratios from the instantaneous amplitude and phase angle for each modal response. When the responses at all degrees of freedom are measured, the mode shape and the physical mass, damping and stiffness matrices of the structure can be determined. Based on a comparison of the stiffness of each story unit prior to and after the damage, the damage locations and severities can be identified. Experimental results demonstrate that the HHT method yields quite accurate results for engineering applications, providing a promising tool for structural health monitoring.