• Title/Summary/Keyword: software radio

Search Result 472, Processing Time 0.03 seconds

Design and Implementation of NMEA Multiplexer in the Optimized Queue (최적화된 큐에서의 NMEA 멀티플렉서의 설계 및 구현)

  • Kim Chang-Soo;Jung Sung-Hun;Yim Jae-Hong
    • Journal of Navigation and Port Research
    • /
    • v.29 no.1 s.97
    • /
    • pp.91-96
    • /
    • 2005
  • The National Marine Electronics Association(NMEA) is nonprofit-making cooperation composed with manufacturers, distributors, wholesalers and educational institutions. We use the basic port of equipment in order to process the signal from NMEA signal using equipment. When we don't have enough one, we use the multi-port for processing. However, we need to have module development simulation which could multiplex and provide NMEA related signal that we could solve the problems in multi-port application and exclusive equipment generation for a number of signal. For now, we don't have any case or product using NMEA multiplexer so that we import expensive foreign equipment or embody NMEA signal transmission program like software, using multi-port. These have problems since we have to pay lots ci money and build separate processing part for every application programs. Besides, every equipment generating NMEA signal are from different manufactures and have different platform so that it could cause double waste and loss of recourse. For making up for it, I suggest the NMEA multiplexer embodiment, which could independently move by reliable process and high performance single hardware module, improve the memory efficiency of module by designing the optimized Queue, and keep having reliability for realtime communication among the equipment such as main input sensor equipment Gyrocompass, Echo-sound, and GPS.

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

The Variation of Tagging Contrast-to-Noise Radio (CNR) of SPAMM Image by Modulation of Tagline Spacing (Tagline 간격의 조절을 통한 SPAMM 영상에서의 Tagging 대조도 대 잡음비의 변화)

  • 강원석;최병욱;최규옥;이상호;홍순일;정해조;김희중
    • Progress in Medical Physics
    • /
    • v.13 no.4
    • /
    • pp.224-228
    • /
    • 2002
  • Myocardial tagging technique such as spatial modulation of magnetization (SPAMM) allows the study of myocardial motion with high accuracy. However, the accuracy of the estimation of tag intersection can be affected by tagline spacing. The aim of this study was to investigate the relationship between tagline spacing of SPAMM image and tagging contrast-to-noise ratio (CNR) in in-vivo study. Two healthy volunteers were undergone electrocardiographically triggered MR imaging with SPAMM-based tagging pulse sequence at a 1.5T MR scanner. Horizontally modulated stripe patterns were imposed with a range from 3.6 to 9.6 mm of tagline spacing. Images of the left ventricle(LV) wall were acquired at the mid-ventricle level during cardiac cycle with FE-EPI (TR/TE = 5.8/2.2 msec, FA= 10$^{\circ}$. Tagging CNR for each image was calculated with a software which developed in our group. During contraction, tagging CNR was more rapidly decreased in case of narrow tagline spacing than in case of wide tagline spacing. In the same heart phase, CNR was increased corresponding with tagline spacing. Especially, at the fully contracted heart phase, CNR was more rapidly increased than the other heart phases as a function of tagline spacing. The results indicated that the optimization of tagline spacing provides better tagging CNR in order to analyze the myocardial motion more accurately.

  • PDF

PSS Movement Prediction Algorithm for Seamless hando (휴대인터넷에서 seamless handover를 위한 단말 이동 예측 알고리즘)

  • Lee, Ho-Jeong;Yun, Chan-Young;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.53-60
    • /
    • 2006
  • Handover of WiBro is based on 802.16e hard handover scheme. When PSS is handover, it is handover that confirm neighbor's cell condition and RAS ID in neighbor advertisement message. Serving RAS transmits HO-notification message to neighbor RAS. Transmiting HO-notification message to neighbor RAS, it occurs many signaling traffics. Also, When WiBro is handover, It occurs many packet loss. Therefore, user suffer service degradation. LPM handover is supporting seamless handover because it buffers data packets during handover. So It is proposed scheme that predicts is LPM handover and reserves target RAS with pre-authentication. These schemes occur many signaling traffics. In this paper, we propose PSS Movement Prediction to solve signaling traffic. Target RAS is decided by old data in history cache. When serving RAS receives HO-notification-RSP message to target RAS, target RAS inform to crossover node. And crossover node bicast data packet. If handover is over, target RAS forward data packet. Therefore, It reduces signaling traffics but increase handover success rate. When history cache success, It decrease about 48% total traffic. But When history cache fails, It increase about 6% total traffic

A Study on the Development of Field Management System for Underground utility using Self-levelling marker and DGPS. (자동수평마커와 DGPS를 이용한 지하시설물의 현장관리시스템 개발에 관한 연구)

  • Kim, In-Seup
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.6
    • /
    • pp.733-739
    • /
    • 2009
  • Recently it is being increased rapidly to install magnetic marker and RFID tag on the underground utility lines before backfilling to ensure effective it's management. However, due to changes an attitude and damages of sensors. By pressure and vibration during soil compacting, detecting rate is significantly reduced as well as it allows to use only one line of various pipes since it has an unique frequency. Also it is required too long time to reach to target point with an non-accurate navigational GPS receiver and hard to update existing data base with a manual input of new data in the field. To improve these problems, the researcher developed the field management system that apply with ball typed self-levelling marker which is free from the changes of attitude for sensors during compaction as well as has various radio frequency applicable to many kind of pipes and ensure fast positioning to target point using an incorporated system with PDA based DGPS receiver which allows loading a field GIS software and RFID detector. Further, it provides with viewing all of RFID data on the DGPS receiver screen directly and also input new data to existing data base in the field automatically.

Automatic Segmentation of Pulmonary Structures using Gray-level Information of Chest CT Images (흉부 CT 영상의 밝기값 정보를 사용한 폐구조물 자동 분할)

  • Yim, Ye-Ny;Hong, Helen
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.11
    • /
    • pp.942-952
    • /
    • 2006
  • We propose an automatic segmentation method for identifying pulmonary structures using gray-level information of chest CT images. Our method consists of following five steps. First, to segment pulmonary structures based on the difference of gray-level value, we select the threshold using optimal thresholding. Second, we separate the thorax from the background air and then the lungs and airways from the thorax by applying the inverse operation of 2D region growing in chest CT images. To eliminate non-pulmonary structures which has similar intensities with the lungs, we use 3D connected component labeling. Third, we segment the trachea and left and right mainstem bronchi using 3D branch-based region growing in chest CT images. Fourth, we can obtain accurate lung boundaries by subtracting the result of third step from the result of second step. Finally, we select the threshold in accordance with histogram analysis and then segment radio-dense pulmonary vessels by applying gray-level thresholding to the result of the second step. To evaluate the accuracy of proposed method, we make a visual inspection of segmentation result of lungs, airways and pulmonary vessels. We compare the result of the conventional region growing with the result of proposed 3D branch-based region growing. Experimental results show that our proposed method extracts lung boundaries, airways, and pulmonary vessels automatically and accurately.

Development of Robotic System based on RFID Scanning for Efficient Inventory Management of Thick Plates (효율적인 후판 재고관리를 위한 RFID 스캐닝 로봇 시스템 개발)

  • Lee, Kwang-Hyoung;Min, So-Yeon;Lee, Jong-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.1-8
    • /
    • 2016
  • Automation of inventory management in a steel plate factory was a difficult problem unresolved for a long time. And now, it is also necessary to work diligently in the steel industry on efficient inventory management of thick plates. So far, the environmental characteristics of stacked thick plates means it is not easy to apply advanced technology for their automatic identification. In this paper, we propose a thick-plate robotic scanning system based on radio-frequency identification (RFID) that can provide quick and accurate inventory management by acquiring plate information after the scanning automatically recognizes the RFID tags under difficult load conditions. This system is equipped with a crane to move the plates in a pulled-up operation. It is equipped with a plate-only linear dipole antenna only for scanning the position of the plate tag. Only the linear dipole antenna, while moving the x-axis and y-axis information, automatically identifies the tag information attached to the plate. The tag information acquired by the system is used for stockpiling and is managed by steel plate inventory control software. The effectiveness of the proposed system is verified through field performance evaluation. As a result, the recognition rate of the plate tags is 99.9% at a maximum distance of 320 cm. The developed thick-plate antenna showed excellent performance compared to an existing commercial antenna.

Dose Distribution and Characterization for Radiation Fields of Multileaf Collimateor System (방사선 입체조형치료용 다엽콜리메이터의 특성과 조직내 선량분포 측정)

  • Chu, Sung-Sil;Kim, Gwi-Eon
    • Radiation Oncology Journal
    • /
    • v.14 no.1
    • /
    • pp.77-85
    • /
    • 1996
  • Purpose : Multileaf collimator(MLC) is very suitable tool for conformal radio-therapy and commissioning measurements for a multileaf collimator installed on a dual energy accelerator with 6 and 10MV photons are required, For modeling the collimator with treament planning software, detailed dosimetric characterization of the multileaf collimator including the penumbra width, leaf transmission between leaf leakage and localization of the leaf ends and sides is an essential requirement. materials and Methods : Measurement of characteristic data of the MLC with 26 pair block leaves installed on CLINAC 2100C linear accelerator was performed. Low sensitive radiographic film(X-omatV) was used for the penumbra measurement and separate experiments using radiographic film and thermoluminescent dosimeters were performed to verify the dose distribution, Measured films were analized with a photodensitometer of WP700i scanner. Results : For 6 & 10 MV x-ray energies, approximately $2.0\%$ of photons incident on the multileaf collimator were transmitted and an additional $0.5\%$ leakage occurs between the leaves. Localizing the physical end of the leaves showed less than 1mm deviation from the $50\%$ decrement line and this difference is attributed to the curved shaped end on the leaves One side of a sin히e leaf corresponded to the $50\%$ decrement line, but the opposite face was aligned with a lower value. This difference is due to the tongue and groove used to decrease between leaf leakage. Alignment of the leaves to form a straight edge resulted larger penumbra at far position from isocenter as compare with divergent alloy blocks. When the MLC edge is stepped by sloping field, the isodose lines follow the leaf pattern and Produce scalloping isodose curves in tissue. The effective penumbra by 45 degree stepped MLC is about 10mm at 10cm depth for 6MV x-ray. The difference of effective penumbra in deep tissue between MLC and divergent alloy blocks is small (5mm). Conclusion : Using the characteristic data of MLC, the MLC has the clinlical acceptability and suitability for 3-D conformal radiotherapy except small field size.

  • PDF

A CT Simulator Phantom for Geometrica1 Test (CT 시뮬레이터의 기하학적 성능평가용 팬톰)

  • Min, Chul-Kee;Yi, Byong-Yong;Ahn, Seung-Do;Choi, Eun-Kyung;Chang, Hye-Sook
    • Radiation Oncology Journal
    • /
    • v.18 no.4
    • /
    • pp.337-344
    • /
    • 2000
  • Purpose :To design and test test CT simulator phantom for geometrical test. Materials and Methods : The PMMA phantom was designed as a cylinder which is 20 cm in diameter and 24 cm in length, along with a 25$\times25\times31cm^{3}$ rectangular parallelepiped. Radio-opaque wires of which diameter is 0.8 mm are attached on the other surface of the phantom as a spiral. The rectangular phantom was made of four 24$\times24\times0.5 cm^{3}$ square plates and each plate had a 24$\times24 cm^{2}$, 12$\times12cm^{2}$, 6$\times6 cm$^{2}$ square line. The squares were placed to face the cylinder at angles 0 $^{\circ}$ , 15 $^{\circ}$ , 30 $^{\circ}$ ,respectively. The rectangular phantom made it possible to measure the field size, couch angle, the collimator angle, the isocenter shift and the SSD, the measurements of the gantry angle from the cylindrical part. A virtual simulation software, AcOSim, offered various conditions to perform virtual simulations and these results were used to perform the geometrical Quality assurance of CT simulator. Results : A 0.3$\~$0.5 mm difference was found on the 24 cm field size which was created with the DRR measurements obtained by scanning of the rectangular phantom. The isocenter shift, the collimator rotation, the couch rotation, and the gantry rotation test showed 0.5$\~$1 mm, 0.5$\~$l$^{\circ}$ 0.5$\~$ 1$^{\circ}$ , and 0.5-1 $^{\circ}$ differences, respectively. We could not find any significant differences between the results from the two scanning methods. Conclusion :The geometrical test phantom developed in the study showed less than 1 mm (or 1 $^{\circ}$ ) differences. The phantom could be used as a routine geometrical QC/QA tools, since the differences are within clinically acceptable ranges.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.