• Title/Summary/Keyword: multiple verification

Search Result 521, Processing Time 0.032 seconds

Study on Multiple & Complex threat situation emulation for ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협 상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.516-520
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon system, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to take action against at modernized hostile weapon under current battlefield. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. Multiple and complex threat emulation is an effective means of ASE system verification In this study, It discuss system verification method before installation by dealing with complex threat situation consists of individual threat.

  • PDF

Design and Verification of Satellite B-ISDN Multi-Signalling Protocol (위성 B-ISDN 다중신호 프로토콜의 설계 및 검증)

  • 박석천;남기모;김동영;변지섭;최동영
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.13-16
    • /
    • 1999
  • The terrestrial/satellite hybrid network may replace or supply the terrestrial network in some areas or certain application. Futhermore, it can play an important role in the development of B-ISDN due to their features of flexible wide coverage, independent of ground distances and geographical constraints, multiple access and multipoint broadcast. Also, satellite have the capability to supply terrestrial ATM and B-ISDN with flexible links for access networks as well as trunk networks. This paper describes the design and verification of the interworking protocol between terrestrial B-ISDN and satellite network. For the verification, the designed interworking protocol is modeled by Petri-net and analyzed by reachability tree.

  • PDF

Boundary Stitching Algorithm for Fusion of Vein Pattern (정맥패턴 융합을 위한 Boundary Stitching Algorithm)

  • Lim, Young-Kyu;Jang, Kyung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.521-524
    • /
    • 2005
  • This paper proposes a fusion algorithm which merges multiple vein pattern images into a single image, larger than those images. As a preprocessing step of template matching, during the verification of biometric data such as fingerprint image, vein pattern image of hand, etc., the fusion technique is used to make reference image larger than the candidate images in order to enhance the matching performance. In this paper, a new algorithm, called BSA (Boundary Stitching Algorithm) is proposed, in which the boundary rectilinear parts extracted from the candidate images are stitched to the reference image in order to enlarge its matching space. By applying BSA to practical vein pattern verification system, its verification rate was increased by about 10%.

  • PDF

Desing and Verification of Satellite B-ISDN Signalling Protocol (위성 B-ISDN 신호 프로토콜의 설계 및 검증)

  • Park, Seok-Cheon;Choe, Dong-Yeong;Gang, Seong-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1909-1918
    • /
    • 1999
  • The terrestrial/satellite hybrid network may replace or supply the terrestrial network in some areas or certain applications. For example, it may play a major role in global B-ISDN or in certain areas where the deployment of optical cable is not feasible, especially at the early stage of implementing terrestrial B-ISDN. Furthermore, it can play an important role in the development of B-ISDN due to their features of flexible wide coverage, independent of ground distances and geographical constraints, multiple access and multipoint broadcast. Also, satellite have the capability to supply terrestrial B-ISDN/ATM with flexible links for access networks as well as trunk networks. This paper describes the design and verification of the interworking protocol between terrestrial B-ISDN뭉 satellite network. For the verification, the designed interworking protocol is modeled by Petri-net and the model is analyzed by reachability tree.

  • PDF

Design and Analysis of Polarization Diversity Antenna for Mobile Terminals

  • Lee, Won-Woo;Rhee, Byung-Ho
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.155-158
    • /
    • 2014
  • This letter presents an antenna design method for an orthogonally-polarized dual antenna for use in mobile stations (MSs) and includes a verification method for improving the link-level throughput performance of an MS that uses a proposed multiple-input multiple-output antenna. The link-level throughput performance of an MS is strongly related to the correlation between antenna branches, which is determined by the cross polarization discrimination of the second branch antenna, both numerically and experimentally.

Design and implementation of the MAC protocol for underwater vehicle network (수중 이동체 통신망을 위한 접속제어 프로토콜의 설계 및 구현)

  • 신동우;임용곤;김영길
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.180-188
    • /
    • 1997
  • This paper proposes a new efficient MAC(Media Access Control) protocol to establish the ultrasonic communication network for underwater vehicles, which ensures a certain level of maximum throughput regardless of the propagation delay of ultrasonic and allows fast data transmission through the multiple ultrasonic communication channel. A MAC protocol for underwater communication network that allows 'peer-to-peer' communication between a surface ship and multiple underwater systems is designed, and the proposed control protocol is implemented for its verification.

  • PDF

Formal Verification of RACE Protocol Using VIS (VIS를 이용한 RACE 포로토콜의 정형검증)

  • Um, Hyun-Sun;Choi, JIn-Young;Han, Woo-Jong;Ki, An-Do;Shim, Kyu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2219-2228
    • /
    • 2000
  • Caches in a multiprocessing environment introduce the cache coherence problem. When multiple processors maintain locally cached copies of a unique shared-memory location, any local modification of the location can result in a globally inconsistent view of memory. Cache coherence protocols are important to operate a shared-memory multiprocessor system with efficiency and correctness. Since random testing and simulations are not enough to validate correctness of protocols, it is necessary to develop efficient and reliable verification methods. In this appear we present our experience in using VIS (Verification Interacting with Synthesis), a tool of formal method, to analyze a number of property of a cache coherence protocol, RACE (Remote Access Cache coherent Enforcement).

  • PDF

The Effect of Tik Tok Users' Love Types on Love Videos' Motivation and User Satisfaction (틱톡(Tik Tok) 이용자의 연애유형이 연애 동영상의 이용 동기, 이용 만족도에 미치는 영향)

  • Zhao, Meng;Yang, Xi;Lee, Sang Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.5
    • /
    • pp.703-720
    • /
    • 2022
  • Based on the love styles theory used in psychology, this paper classifies users(Passionate Love, Game-playing Love, Friendship Love, Practical Love, Possessive Love, Altruistic Love) and investigates satisfaction with the motivation for using TikTok love videos(Entertainment, Social Relationship, Love skills-learning, Self-verification, Problem-solving) according to the theory of use and satisfaction. First, 414 users were selected to conduct TikTok surveys to collect data. Then, through the analysis of the research results, among the six love types, game-playing type and possessive type have a positive (+) impact on entertainment motivation and love skill-learning motivation. Game-playing type also have a positive (+) impact on social relationship motivation and self-verification motivation. In addition, altruistic type and possessive type are also factors to strengthen the motivation of self-verification. The altruistic type, possessive type and practical type will improve the problem-solving motivation. Finally, through hierarchial multiple regression analysis, it is confirmed that game-playing love type, entertainment motivation, love skill-learning motivation and self-verification motivation can improve user satisfaction. The above results enrich the research of user classification as well as providing inspiration for improving the quality and communication efficiency of TikTok's video and enhancing user experience.

The Suppression of Structural Vibration Using Cantilevers as Multiple Tuned Mass Damper (외팔보 형태의 수동형 Multiple Tuned Mass Damper를 이용한 구조물의 진동 억제)

  • 박재관;백윤수
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1996.04a
    • /
    • pp.169-176
    • /
    • 1996
  • In order to suppress the structural vibration more effectively, Multiple Tuned Mass Damper(MTMD) which is composed of a number of Tuned Mass Damper(TMD) can be used. Especially, the passive MTMD has several advantages over active TMD like easy installment and maintenance, cost and performance for power failure situation(severe damage of power lines from earthquake), etc.. For this purpose the mass and damping ratio of MTMD and the distributed frequency range which shows the range of MTMD's distribution are used as main design parameters. When the passive MTMD is constituted with multiple cantilevers, the facility in its real production and its need for only a smaller space can be named as its several advantages. In this study, the satisfactory results were obtained from the composition of MTMD utilizing dynamic characters of cantilevers, and the verification was done by the comparison of the analysis from MTMD with the computer simulation.

  • PDF

An Implementation of Acoustic-based MAC Protocol Multichannel Underwater Communication Network

  • Lim, Yong-Kon;Park, Jong-Won;Kim, Chun-Suk;Lee, Young-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.1
    • /
    • pp.105-111
    • /
    • 1997
  • This Paper Proposes a new efficient system design strategies for the acoustic-based underwater multiple modem and media access control protocol. The system aims to establish the acoustic-based communication network of an underwater vehicles for deep sea mining, which ensures a certain level of maximum throughput regardless of the propagation delay of acoustic and allows fast data transmission through the acoustic-based multiple channel. A media access control protocol for integrated communication network and it's acoustic-based communication modems that allows 'peer-to-peer' communication between a surface mining plant multiple underwater system is designed, and the proposed media access control protocol is implemented for its verification. Furthermore, a proposed design strategies which make it possible to control the multiple vehicle for an underwater mining is presented in this paper.

  • PDF