• Title/Summary/Keyword: code tracking

Search Result 222, Processing Time 0.031 seconds

Application of the Differential GPS method for Navigation and Acquisition of the Geo-Spatial Information (지형공간정보의 획득과 항법을 위한 DGPS기법의 응용)

  • ;Alfred Leick
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.18 no.2
    • /
    • pp.101-110
    • /
    • 2000
  • This study focuses on examination of the availability and effectiveness about application of the differential GPS methods for navigation and acquisition of the geo-spatial information. For this, the algorithms related to a navigation solution and differential GPS were implemented in MATLAB code, a number of software simulations on test model were carried out to assess its performance, comparing the results with those obtained from the commercial software. Expecially, the results coming from tracking test on test model of the OO's WADGPS which is the commercial real-time satellite-based augmentation system via geostationary satellite (GEOs), which has been investigated with those from the above GPS methods. And also, the accuracy of absolute positioning by Navigation solution and WADGPS before and after SA-off has been compared. The above results show that DGPS methods are very reliable and efficient methods for acquisition of the geo-spatial information.

  • PDF

A Study on Efficient Packet Design for Underwater Acoustic Communication (수중음향통신에서 효율적인 패킷 설계에 관한 연구)

  • Park, Tae-Doo;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.36 no.8
    • /
    • pp.631-635
    • /
    • 2012
  • Underwater acoustic communication has multipath error because of reflection by sea-level and sea-bottom. The multipath of underwater channel causes signal distortion and error floor. In this paper, in order to design an efficient packet structure, we employ channel coding scheme and phase recovery algorithm. For channel coding scheme, half rate LDPC channel coding scheme with N=1944 and K=972 was used. Also, decision directed phase recovery was used for correcting phase offset induced by multipath. Based on these algorithms, we propose length of data for optimal packet structure in the environment of oceanic experimentation.

A Study on Effects of Axial Gas Flow in the Gap and Fuel Cracking on Fission Gas Release under Power Ramping (출력 감발 조건하에서 핵분열 기체 생성물의 방출에 대한 축방향 기체 유동과 핵연료 파손의 영향에 관한 연구)

  • Han, Jin-Kyu;Yoon, Young-Ku
    • Nuclear Engineering and Technology
    • /
    • v.22 no.2
    • /
    • pp.116-127
    • /
    • 1990
  • The fission gas release model used In the SPEAR-BETA fuel performance code was modified by use of effective thermal conductivity for cracked fuel and by laking Into account axial fission-gas mixing between the fuel-clad gap and the plenum. With use of this modified model the fission gas release was analyzed under various power ramping conditions of P$_{max}$ and $\Delta$.fP. Effective fuel thermal conductivity that accounts for the effect of fuel tracking was used in calculation of the fuel temperature distribution and the Internal gas pressure under power ramping conditions. Mixing and dilution effects due to axial gas flow were also considered in computing the width and the thermal conductivity of the gap. The effect of axial gas flow w3s solved by the Crank-Nicholson method. The finite difference method was used to save running time in the calculation. The present modified fission-gas release model was validated by comparing its predicted results with experimental data from various lamping tests In the literature and calculated results with use of the models used In the SPEAR-BETA and FEMAXI-IV codes. Results obtained with use of the present modified model showed better agreement with experimental data reported in the literature than those results with use of the latter codes. The fuel centerline temperature calculated with introduction of effective thermal conductivity for centerline temperature calculated with Introduction of effective thermal conductivity for cracked fuel was 200 higher fission gas release predicted with use of the modified model was nearly 6% larger on the average than that calculated by use of the unmodified model used in the SPEAR-BETA code.e SPEAR-BETA code.e.

  • PDF

Visible Light Communication Based Wide Range Indoor Fine Particulate Matter Monitoring System (가시광통신 기반 광역 실내 초미세먼지 모니터링 시스템)

  • Shakil, Sejan Mohammad Abrar;An, Jinyoung;Han, Daehyun;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.1
    • /
    • pp.16-23
    • /
    • 2019
  • Fine particulate matter known as PM 2.5 refers to the atmospheric particulate matter that has a diameter less than 2.5 micrometer identified as dangerous element for human health and its concentration can provide us a clear picture about air dust concentration. Humans stay indoor almost 90% of their life time and also there is no official indoor dust concentration data, so our study is focused on measuring the indoor air quality. Indoor dust data monitoring is very important in hospital environments beside that other places can also be considered for monitoring like classrooms, cements factories, computer server rooms, petrochemical storage etc. In this paper, visible light communication system is proposed by Manchester encoding technique for electromagnetic interference (EMI)-free indoor dust monitoring. Important indoor environment information like dust concentration is transferred by visible light channel in wide range. An average voltage-tracking technique is utilized for robust light detection to eliminate ambient light and low-frequency noise. The incoming light is recognized by a photo diode and are simultaneously processed by a receiver micro-controller. We can monitor indoor air quality in real-time and can take necessary action according to the result.

Authentication Protocol of Private Code-based for Advanced Security of RFID System (RFID 시스템 보안 강화를 위한 비공개 코드 기반의 인증 프로토콜)

  • Jang, Bong-Im;Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.737-744
    • /
    • 2010
  • The use of RFID recently tends to increase and is expected to expand all over the industry and life. However, RFID is much vulnerable to the malign threats such as eavesdropping, replay attack, spoofing attack, location tracking in the process of authentication. In particular, it is difficult to apply authentication protocol used in the other previous system to low-priced RFID tag. After all, this paper suggests the scheme of efficient authentication protocol for RFID privacy protection. Compared to the previous scheme, suggested scheme reinforces the checking process of transmission data and is secure from eavesdropping and spoofing attack. It minimizes the operation work of the tag and is very useful to apply to the low-priced tag. It also has the merit to confirm the efficiency of communication by reducing the communication rounds.

Performance Evaluation of a Pilot Interference Cancellation Scheme in a WCDMA Wireless Repeater (WCDMA 무선 중계기에서 파일럿 간섭제거 기법의 성능평가)

  • Kim, Sun-Ho;Shim, Hee-Sung;Im, Sung-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.111-117
    • /
    • 2009
  • In the wideband code division access (WCDMA) systems, a pilot channel is used to determine WCDMA network coverage, cell identification, synchronization, timing acquisition and tracking, user-set handoff, channel estimation, and so on. A wireless repeater, which is deployed in the urban area for the WCDMA system to meet the growing demand on wireless communication services, has the possibility to receive several pilot signals from a large number of base stations, however, cannot distinguish its service base station's signal among them. This pilot interference results in frequent handoffs in the user equipment, which degrades the radio reception, transmission efficiency, quality of service, and channel capacity and increases the unwanted power consumption. In this paper, thus, we propose a pilot pollution interference cancellation scheme using one of the adaptive estimation algorithms, normalized least mean square (NLMS), which is applicable to a wireless repeater. We carried out link-level and network-level computer simulations to evaluate the performance of the proposed scheme in a wireless repeater. The simulation results verify the bit error rate (BER) improvement in the link level and the call drop probability improvement in the network level.

Research on the Implementation of Infrared Threat Surrogate for DIRCM Performance Analysis (지향성 적외선 방해장치 성능분석을 위한 위협체모사기 구축에 관한 연구)

  • Chun, Seung-Woo;Kim, Joy;Cho, Soo-Hyung;Kim, Jae-Hyup;Yu, Hyun-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.97-106
    • /
    • 2015
  • In this paper, the development of infrared threat surrogate system is described and it can be used to verify the performance of DIRCM system. In this research, threat surrogates are manufactured using same F# and reflective optics used in 1st- and 2nd-Gen. real seeker so that the threat surrogate system can be used to develop code-based jamming techniques. Also the threat surrogate system can analyze the saturation jamming effect for image seeker using FPA detector. The result shows that 1st- and 2nd-generation threat surrogates have relatively precise tracking performance and jamming effect.

Design and Implementation of 60 GHz Wi-Fi for Multi-gigabit Wireless Communications (멀티-기가비트 무선 통신을 위한 60GHz Wi-Fi 설계 및 구현)

  • Yoon, Jung-Min;Jo, Ohyun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.43-49
    • /
    • 2020
  • In spite of the notable advancements of millimeter wave communication technologies, the 60 GHz Wi-Fi is still not widespread yet, mainly due to the high limitation of coverage. Conventionally, it has been hardly possible to support a high data rate with fast beam adaptation while keeping atmospheric beamforming coverage. To solve these challenges in the 60 GHz communication system, holistic system designs are considered. we implemented an enhanced design LDPC decoder enabling 6.72 Gbps coded-throughput with minimal implementation loss, and our proposed phase-tracking algorithm guarantees 3.2 dB performance gain at 1 % PER in the case of 16 QAM modulation and LDPC code-rate 3/4.

Improvement of duty rate on Meteor Burst Communication using DS-SS system (DS-SS방식을 이용한 유성 버스트 통신의 도통율 개선)

  • 권혁숭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.669-677
    • /
    • 2003
  • In spite of many advantages of Meteor Burst Communications(MBC) on its transmission channel, the fact that its duty rate is less than10 percents is a considerable deficiency of MBC. To overcome with this deficiency without paying large cost, we use a direct sequence(DS)-spread spectrum(SS) method applying a reference code to improve the duty rate on the transmission channel. This method doesn't need to add the components for acquisition or tracking the signal so that it keeps the cost efficiency the MBC has as well as improves the duty rate on the transmission channel. The improvement by this method is more significant when the received signal is weak. Simulation results show that if we increases the process gain (Gp) by 10 dB when the average burst length is 50ms, the burst length tends to be extended more than 220% of its average length, 160ms, and the frequency of generating this phenomenon increases 3.1 times more.

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF