• 제목/요약/키워드: trend algorithm

검색결과 427건 처리시간 0.026초

DSP를 이용한 전력용 변압기용 IED의 하드웨어 설계 (Hardware Design of IED using DSP for Power Transformer Protection)

  • 박철원;정연만;하경재;구춘서;신명철
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 하계학술대회 논문집 A
    • /
    • pp.363-365
    • /
    • 2004
  • This paper proposes a hardware implementation of intelligent electronic device for power transformer protection. And proposes an advanced main protection algorithm by voltage-current trend and flux-differential current slope characteristics. The secondary protection functions include UR, OCGR, OVR, and W etc. The main board of IED is based on the DSP chip TMS32C32 processor The IED was tested with relaying signals obtained for EMTP simulation package.

  • PDF

SSD를 위한 최적화 파일시스템 (An Optimized File System for SSD)

  • 박제호
    • 반도체디스플레이기술학회지
    • /
    • 제9권2호
    • /
    • pp.67-72
    • /
    • 2010
  • Recently increasing application of flash memory in mobile and ubiquitous related devices is due to its non-volatility, fast response time, shock resistance and low power consumption. Following this trend, SSD(Solid State Disk) using multiple flash chips, instead of hard-drive based storage system, started to widely used for its advantageous features. However, flash memory based storage subsystem should resolve the performance bottleneck for writing in perspective of speed and lifetime according to its disadvantageous physical property. In order to provide tangible performance, solutions are studied in aspect of reclaiming of invalid regions by decreasing the number of erasures and distributing the erasures uniformly over the whole memory space as much as possible. In this paper, we study flash memory recycling algorithms with multiple management units and demonstrate that the proposed algorithm provides feasible performance. The proposed method utilizes the partitions of the memory space by utilizing threshold values and reconfigures the management units if necessary. The performance of the proposed policies is evaluated through a number of simulation based experiments.

IoT Connectivity Application for Smart Building based on Analysis and Prediction System

  • COROTINSCHI, Ghenadie;FRANCU, Catalin;ZAGAN, Ionel;GAITAN, Vasile Gheorghita
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.103-108
    • /
    • 2021
  • The emergence of new technologies and their implementation by different manufacturers of electronic devices are experiencing an ascending trend. Most of the time, these protocols are expected to reach a certain degree of maturity, and electronic equipment manufacturers use simplified communication standards and interfaces that have already reached maturity in terms of their development such as ModBUS, KNX or CAN. This paper proposes an IoT solution of the Smart Home type based on an Analysis and Prediction System. A data acquisition component was implemented and there was defined an algorithm for the analysis and prediction of actions based on the values collected from the data update component and the data logger records.

Object detection technology trend and development direction using deep learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • 제8권4호
    • /
    • pp.119-128
    • /
    • 2020
  • Object detection is an important field of computer vision and is applied to applications such as security, autonomous driving, and face recognition. Recently, as the application of artificial intelligence technology including deep learning has been applied in various fields, it has become a more powerful tool that can learn meaningful high-level, deeper features, solving difficult problems that have not been solved. Therefore, deep learning techniques are also being studied in the field of object detection, and algorithms with excellent performance are being introduced. In this paper, a deep learning-based object detection algorithm used to detect multiple objects in an image is investigated, and future development directions are presented.

양자컴퓨터 제어 기술 (Technical Trend and Challenging Issues for Quantum Computing Control System)

  • 정용화;최병수
    • 전자통신동향분석
    • /
    • 제36권3호
    • /
    • pp.87-96
    • /
    • 2021
  • Quantum computers will be a game-changer in various fields, such as cryptography and new materials. Quantum computer is quite different from the classical computer by using quantum-mechanical phenomena, such as superposition, entanglement, and interference. The main components of a quantum computer can be divided into quantum-algorithm, quantum-classical control interface, and quantum processor. Universal quantum computing, which can be applied in various industries, is expected to have more than millions of qubits with high enough gate accuracy. Currently, It uses general-purpose electronic equipment, which is placed in a rack, at room temperature to make electronic signals that control qubits. However, implementing a universal quantum computer with a low error rate requires a lot of qubits demands the change of the current control system to be an integrated and miniaturized system that can be operated at low temperatures. In this study, we explore the fundamental units of the control system, describe the problems and alternatives of the current control system, and discuss a future quantum control system.

고성능 분산 합의 알고리즘 동향 분석 (Trend Analysis of High-Performance Distributed Consensus Algorithms)

  • 진희상;김동오;김영창;오진태;김기영
    • 전자통신동향분석
    • /
    • 제37권1호
    • /
    • pp.63-72
    • /
    • 2022
  • Recently, blockchain has been attracting attention as a high-reliability technology in various fields. However, the Proof-of-Work-based distributed consensus algorithm applied to representative blockchains, such as Bitcoin and Ethereum, has limitations in applications to various industries owing to its excessive resource consumption and performance limitations. To overcome these limitations, various distributed consensus algorithms have appeared, and recently, hybrid distributed consensus algorithms that use two or more consensus algorithms to achieve decentralization and scalability have emerged. This paper introduces the technological trends of the latest high-performance distributed consensus algorithms by analyzing representative hybrid distributed consensus algorithms.

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

드론 자율비행 기술 동향 (Survey on Developing Autonomous Micro Aerial Vehicles)

  • 김수성;정성구;차지훈
    • 전자통신동향분석
    • /
    • 제36권2호
    • /
    • pp.1-11
    • /
    • 2021
  • As sensors such as Inertial Measurement Unit, cameras, and Light Detection and Rangings have become cheaper and smaller, research has been actively conducted to implement functions automating micro aerial vehicles such as multirotor type drones. This would fully enable the autonomous flight of drones in the real world without human intervention. In this article, we present a survey of state-of-the-art development on autonomous drones. To build an autonomous drone, the essential components can be classified into pose estimation, environmental perception, and obstacle-free trajectory generation. To describe the trend, we selected three leading research groups-University of Pennsylvania, ETH Zurich, and Carnegie Mellon University-which have demonstrated impressive experiment results on automating drones using their estimation, perception, and trajectory generation techniques. For each group, we summarize the core of their algorithm and describe how they implemented those in such small-sized drones. Finally, we present our up to date research status on developing an autonomous drone.

Application of the Robust Control Theory to the Dynamic Voltage Restorer

  • Y. Chun;Kim, J.;J. Jeon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.38.2-38
    • /
    • 2001
  • Recent trend of increasing automated factories needs supply of high quality power from the utilities. Among the items of the power quality, voltage sag can be compensated by Dynamic Voltage Restorer(DVR). The key feature of the DVR is high response with less transient period to recover from the voltage sag due to the lightning or line-to-ground faults. In this paper we report that H controller is very premising for the practical application to the controller of DVR. Experiment al results shown in this paper was obtained by applying the control algorithm to 20 kVA DVR system. The experimental set consist s of IGBT - based three phase inverter and the TMS320C32- 60 DSP used for main processor of the control board. T$\infty$ simulate the 50% voltage ...

  • PDF

코드기반암호에 대한 ISD 공격 알고리즘 연구 동향 (ISD attack algorithm research trend for code-based cryptography)

  • 송경주;강예준;장경배;서화정
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2021년도 춘계학술발표대회
    • /
    • pp.167-170
    • /
    • 2021
  • 현재, 주요 선진국들을 포함하여 Google과 IBM과 같은 국제 대기업들을 필두로 양자 컴퓨터 개발에 전폭적인 투자들을 하고 있다. 양자 컴퓨터는 특정 분야에 있어 월등한 계산 능력을 보여주며, 기존 컴퓨터에서는 해결할 수 없던 몇몇 문제들을 빠른 시간 내에 해결한다. 이러한 양자 컴퓨터의 등장은 기존 컴퓨터에서는 사실상 풀 수 없는 암호 알고리즘들을 빠른 시간 내에 해결하여 암호학계에 큰 위협이 되고 있다. 현재 사용하고 있는 대부분의 공개키 암호 알고리즘인 RSA와 ECC(Elliptic Curve Cryptography) 또한 공격 대상이다. NIST에서는 다가오는 양자 컴퓨터 시대에 대비하여 양자내성암호 공모전을 주최하였으며 현재 라운드 3에 도입하였다. 본 논문에서는 라운드 3의 후보 알고리즘인 코드기반암호를 공격하는 ISD(Information Set Decoding) 알고리즘에 관한 동향을 조사하였다.