• Title/Summary/Keyword: frequency delay

Search Result 1,296, Processing Time 0.024 seconds

Digitally Current Controlled DC-DC Switching Converters Using an Adjacent Cycle Sampling Strategy

  • Wei, Tingcun;Wang, Yulin;Li, Feng;Chen, Nan;Wang, Jia
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.227-237
    • /
    • 2016
  • A novel digital current control strategy for digitally controlled DC-DC switching converters, referred to as Adjacent Cycle Sampling (ACS), is proposed in this paper. For the ACS current control strategy, the available time interval from sampling the current to updating the duty ratio, is approximately one switching cycle. In addition, it is independent of the duty ratio. As a result, the contradiction between the processing speed of the hardware and the transient response speed can be effectively relaxed by using the ACS current control strategy. For digitally controlled buck DC-DC switching converters with trailing-edge modulation, digital current control algorithms with the ACS control strategy are derived for three different control objectives. These objectives are the valley, average, and peak inductor currents. In addition, the sub-harmonic oscillations of the above current control algorithms are analyzed and eliminated by using the digital slope compensation (DSC) method. Experimental results based on a FPGA are given, which verify the theoretical analysis results very well. It can be concluded that the ACS control has a faster transient response speed than the time delay control, and that its requirements for hardware processing speed can be reduced when compared with the deadbeat control. Therefore, it promises to be one of the key technologies for high-frequency DC-DC switching converters.

Analysis of Performance of Spoofing Detection Algorithm in GPS L1 Signal (GPS L1 기만신호 검출 알고리즘 성능 분석)

  • Kim, Taehee;Kim, Jaehoon;Lee, Sanguk
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.29-35
    • /
    • 2013
  • In this paper, we investigate the type and detection methode of spoofing attack, and then analyze the performance of spoofing detection algorithm in GPS L1 signal through the simulation. Generally spoofer is different from the jammer, because the receiver can be operated and not. In case of spoofing the GPS receiver is hard to recognize the spoofing attack and can be operated normally without stopping because the spoofing signal is the mimic GPS signal. To evaluate the performance of spoofing detection algorithm, both the software based spoofing and GPS signal generator and the software based GPS receiver are implemented. In paper, we can check that spoofing signal can affect to the DLL and PLL tracking loop because code delay and doppler frequency of spoofing. The spoofing detection algorithm has been implemented using the pseudorange, signal strength and navigation solution of GPS receiver and proposed algorithm can effectively detect the spoofing signal.

Performance analysis and saturation bound research of cyclic-quorum multichannel MAC protocol based on Markov chain model

  • Hu, Xing;Ma, Linhua;Huang, Shaocheng;Huang, Jinke;Sun, Kangning;Huang, Tianyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3862-3888
    • /
    • 2017
  • In high diversity node situation, single-channel MAC protocols suffer from many collisions. To solve this problem, the research of multichannel MAC protocol has become a hotspot. And the cyclic quorum-based multichannel (CQM) MAC protocol outperformed others owing to its high frequency utilization. In addition, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF), is proposed. The metrics (throughput and average packet transmission delay) are calculated in performance analysis, with respect to node number, packet rate, channel slot length and channel number. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm (BSA). Finally, the Markov chain model and saturation bound are verified by Qualnet platform. And the simulation results show that the analytic and simulation results match very well.

Personalized Recommendation System using FP-tree Mining based on RFM (RFM기반 FP-tree 마이닝을 이용한 개인화 추천시스템)

  • Cho, Young-Sung;Ho, Ryu-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.197-206
    • /
    • 2012
  • A exisiting recommedation system using association rules has the problem, such as delay of processing speed from a cause of frequent scanning a large data, scalability and accuracy as well. In this paper, using a Implicit method which is not used user's profile for rating, we propose the personalized recommendation system which is a new method using the FP-tree mining based on RFM. It is necessary for us to keep the analysis of RFM method and FP-tree mining to be able to reflect attributes of customers and items based on the whole customers' data and purchased data in order to find the items with high purchasability. The proposed makes frequent items and creates association rule by using the FP-tree mining based on RFM without occurrence of candidate set. We can recommend the items with efficiency, are used to generate the recommendable item according to the basic threshold for association rules with support, confidence and lift. To estimate the performance, the proposed system is compared with existing system. As a result, it can be improved and evaluated according to the criteria of logicality through the experiment with dataset, collected in a cosmetic internet shopping mall.

Behavioral and cardiac responses in mature horses exposed to a novel object

  • Lee, Kyung Eun;Kim, Joon Gyu;Lee, Hang;Kim, Byung Sun
    • Journal of Animal Science and Technology
    • /
    • v.63 no.3
    • /
    • pp.651-661
    • /
    • 2021
  • This study aimed to investigate whether breed, sex, and age affected temperament differently (more or less neophobic) in mature horses during a novel object test. The study included Jeju crossbred (n = 12, age = 9.42 ± 4.57 y), Thoroughbred (n = 15, age = 10.73 ± 3.09 y), and Warmblood horses (n = 12, age = 13.08 ± 3.55 y) with the females (n = 22, age = 11.36 ± 4.24 y) and geldings (n = 17, age = 10.65 ± 3.66 y). Jeju crossbreds (Jeju horse × Thoroughbred) are valuable considering their popular usage in Korea, but limited studies have explored temperament of Jeju crossbred horses. A trained experimenter touched the left side of the neck with a white plastic bag (novel object). The test ended when the horse stopped escape response and heart rate (HR) dropped to baseline. Behavioral score and escape duration were measured as behavioral variables. Multiple variables related to HR and heart rate variability (HRV) were measured to reflect emotional state. These included basal HR (BHR), maximum HR (MHR), delay to reach maximum heart rate (Time to MHR), standard deviation of beat-to-beat intervals (SDNN), root mean square of successive differences (RMSSD), and ratio of low to high frequency components of a continuous series of heartbeats (LF/HF). Statistics revealed that Thoroughbreds had significantly higher behavioral scores, and lower RMSSD than Jeju crossbreds (p < 0.05), suggesting greater excitement and fear to the novel object in Thoroughbreds. None of the behavioral or cardiac parameters exhibited sex differences (p < 0.05). Age was negatively correlated with SDNN and RMSSD (p < 0.05), indicating that older horses felt more anxiety to the novelty than younger horses. Thoroughbreds and females had distinct correlations between behavioral and HRV variables in comparison with other groups (p < 0.05), implying that escape duration might be a good indicator of stress, especially in these two groups. These results are expected to improve equine welfare, safety and utility, by providing insights into the temperament of particular horse groups, to better match reactivity levels with specific functions.

Risk Factors to Cognitive Function and Life Satisfaction in Elderly Living Alone (독거노인의 인지기능 및 삶의 만족도 위험요인 탐색)

  • Lee, Jee Young
    • Stress
    • /
    • v.26 no.4
    • /
    • pp.259-267
    • /
    • 2018
  • Background: The purpose of this study was to identify the risk factors influencing cognitive function and life satisfaction in elderly living alone. Methods: It was cross-sectional descriptive study by using secondary data from the 2014 national survey of Korean elderly. The study sample consisted of 2,249 subjects who live alone, aged 65 years old and over. Data were analyzed frequency analysis, ${\chi}^2$-test, t-test, ANOVA and Logistic regression analysis. Results: The risk factors that significantly influenced cognitive function were old age, bereavement, lack of education, no regular exercise and low socio-cultural activity satisfaction. The risk factors that significantly influenced life satisfaction were no bereavement, lack of education, no work, negative evaluation of health status, diagnosis of depression and no regular exercise. Also experience of emotional and economical abuse, neglect of financial support and low cognitive function were identified risk factors of life satisfaction. Conclusions: The elderly living alone with risk factors of cognitive decline should be interested. To prevent or delay cognitive impairment, regular exercise and socio-cultural activities were recommended. It was suggested that the promotion of cognitive function, appropriate work and exercise, and social efforts to prevent abuse and neglect can contribute to improving life satisfaction of elderly living alone.

Segment Scheduling Scheme for Efficient Bandwidth Utilization of UHD Contents Streaming in Wireless Environment (무선 환경에서 UHD 콘텐츠의 효율적인 대역폭 활용을 위한 세그먼트 스케줄링 기법)

  • Kim, Heekwang;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • UHD content is characterized by higher bandwidth requirements to provide seamless playback. The existing HTTP adaptive streaming scheme periodically requests video segment of lower quality than the available bandwidth in the steady state. In the steady state, the On-Off pattern is repeated due to the difference of the available bandwidth and the encoding rate of the content. And the repeated Off interval is causing the problem that can not efficiently use the available bandwidth. In the wireless environment where the delay and loss rate are higher with large bandwidth fluctuations, this problem is exacerbated because the available bandwidth is estimated inaccurately. Therefore, in this paper, we propose a segment scheduling scheme for efficient bandwidth utilization of UHD contents streaming in wireless environment. Proposed scheme is a group segment that simultaneously reqeusts multiple segments in one request message in order to reduce frequency of OFF interval. Through simulation, Our scheme improves bandwidth utilization.

Effect of regional emergency medical access on the death rate of elderly individuals with ischemic heart disease (지역별 응급의료접근성이 노인의 허혈성 심장질환 사망률에 미치는 영향)

  • Ko, Eunjung;Cho, Keun-Ja
    • The Korean Journal of Emergency Medical Services
    • /
    • v.25 no.2
    • /
    • pp.19-38
    • /
    • 2021
  • Purpose: This study aimed to investigate the relationship between emergency medical service accessibility in different regions and the sudden death rate in elderly patients with ischemic heart disease using data analysis techniques and suggest improvements in regional emergency medical services. Methods: The study collected data from the NEDIS database and Statistics Korea. Data on a total of 75,867 patients aged ≥65 years were reviewed among patients with ischemic heart disease who visited emergency medical institutions in 2018. Frequency analysis, chi-square test, multiple logistic regression analysis, and simple logistic regression analysis were performed using SPSS PC Window 25.0. Results: With an emergency medical resource per 100km2, there was a concomitant reduction in the risk of death. There was a decrease in the death rate by 0.967, 0.970, 0.997, and 0.391 times with the increase in the presence of a fire department, an ambulance, a paramedic, and a regional medical center, respectively. Furthermore, a decrement in the death rate was witnessed 0.844, 0.825, and 0.975 times with the initiation of a local emergency medical center, a local emergency medical institution, and an angiography device, respectively(p <.001). Conclusion: To improve the accessibility of emergency medical services, the population and geometric area of the region should be considered essential factors when deploying emergency medical resources.

Emergency vehicle priority signal system based on deep learning using acoustic data (음향 데이터를 활용한 딥러닝 기반 긴급차량 우선 신호 시스템)

  • Lee, SoYeon;Jang, Jae Won;Kim, Dae-Young
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.44-51
    • /
    • 2021
  • In general, golden time refers to the most important time in the initial response to accidents such as saving lives or extinguishing fires. The golden time varies from disaster to disaster, but is aimed at five minutes in terms of fire and first aid. However, for the actual site, the average dispatch time for ambulances is 9 minutes and the average transfer time is 17.6 minutes, which is quite large compared to the golden time. There are various causes for this delay, but the main cause is traffic jams. In order to solve the problem, the government has established emergency car concession obligations and secured golden time to prioritize ambulances in places with the highest accident rate, but it is not a solution in rush hour when traffic is increasing rapidly. Therefore, this paper proposed a deep learning-based emergency vehicle priority signal system using collected sound data by installing sound sensors on traffic lights and conducted an experiment to classify frequency signals that differ depending on the distance of the emergency vehicle.

Kriging Regressive Deep Belief WSN-Assisted IoT for Stable Routing and Energy Conserved Data Transmission

  • Muthulakshmi, L.;Banumathi, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.91-102
    • /
    • 2022
  • With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.