• Title/Summary/Keyword: 간섭 무의

Search Result 135, Processing Time 0.024 seconds

The Application of Fiber-Reinforced Composites to Electromagnetic Wave Shielding Enclosures (섬유강화 복합재료의 전자파 차폐 기구물에 대한 적용에 관한 연구)

  • Park Ki-Yeon;Lee Sang-Eui;Lee Won-Jun;Kim Chun-Gon;Han Jae-Hung
    • Composites Research
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2006
  • As the structures of the high performance electronic equipments and devices recently become more complex, the electromagnetic interference (EMI) and compatibility (EMC) have been very essential for commercial and military purposes. Thus, sensitive electrical devices and densely packed systems need to be protected from electromagnetic wave. In this research, glass fabric/epoxy composites containing conductive multi-walled carbon nanotube (MWNT) and carbon fiber/epoxy composites as electrical shielding materials were fabricated and electrical properties of the composites were measured. The concerning frequency band is from 300 MHz to 1 GHz. The performances of composite shielding enclosures were predicted using electromagnetic wave 3-D simulation tool, CST Microwave Studio. The shielding enclosure made of carbon fiber/epoxy composites were fabricated and the shielding effectiveness (SE) was measured in the anechoic chamber.

Encryption and decryption using phase mapping of gray scale image based on a phase-shifting interferometry principle (위상천이 간섭계 원리에 기반한 계조도 영상의 위상 매핑을 이용한 암호화 및 복호화)

  • Seok-Hee Jeon;Sang-Keun Gil
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.271-278
    • /
    • 2024
  • An encryption and decryption method using phase mapping of a gray scale image based on a phase-shifting interferometry principle is proposed in which an encrypted image is formed into complex digital hologram function by symmetric security key in the proposed encryption system.. The gray scale image to be encrypted is converted to phase mapped function that is mixed with a randomly generated binary security encryption key and is used as an input. Decryption of phase information is performed by complex digital hologram and security encryption key, which reconstructs the original gray scale image by phase unmapping. The proposed method confirms that correlation coefficient of the decrypted image is 0.995 when quantization level of CCD is 8-bits(28=256 levels).

Optical Encryption using a Random Phase Image and Shift Position in Joint Transform Correlation Plane (결합 변환 상관 평면의 이동 변위와 무작위 위상 영상을 이용한 광 암호화 시스템)

  • Shin, Chang-Mok;Lee, Woo-Hyuk;Cho, Kyu-Bo;Kim, Soo-Joong;Seo, Dong-Hoan;Lee, Sung-Geun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.248-255
    • /
    • 2006
  • Most optical security systems use a 4-f correlator, Mach-Zehnder interferometer, or a joint transform correlator(JTC). Of them, the JTC does not require an accurate optical alignment and has a good potential for real-time processing. In this paper, we propose an image encryption system using a position shift property of the JTC in the Fourier domain and a random phase image. Our encryption system uses two keys: one key is a random phase mask and the other key is a position shift factor. By using two keys, the proposed method can increase the security level of the encryption system. An encrypted image is produced by the Fourier transform for the multiplication image, which resulted from adding position shift functions to an original image, with a random phase mask. The random phase mask and position shift value are used as keys in decryption, simultaneously. For the decryption, both the encrypted image and the key image should be correctly located on the JTC. If the incorrect position shift value or the incorrect key image is used in decryption, the original information can not be obtained. To demonstrate the efficiency of the proposed system, computer simulation is performed. By analyzing the simulation results in the case of blocking of the encrypted image and affecting of the phase noise, we confirmed that the proposed method has a good tolerance to data loss. These results show that our system is very useful for the optical certification system.

Vegetation of wetland in Mueuido(Incheon-city) (무의도(인천시)의 습지 식생)

  • Paik, Weon-Ki
    • Korean Journal of Plant Resources
    • /
    • v.23 no.2
    • /
    • pp.197-205
    • /
    • 2010
  • This study was carried out to investigate the flora and vegetation in wetland of Mueuido. The forest vegetation was classified into 2 communities group (Utricularia bifida-Eriocaulon sikokianum and Alnus japonica) and 6 communities (Rhynchospora chinensis, Phragmites communis, Molinia japonica, Ischaemum crassipes, Quercus serrata and Pinus rigida-Miscanthus sinesis). Resources vascular plants were composed of 30 families, 53 genera, 50 species and 8 varieties, totaling 58 taxa. Among the investigated resources plants, Utricularia bifida and Utricularia racemosa were rare and endangered species. The special plants based on floral region by Ministry of Environment were 5 taxa; V rank species 2 taxa, II rank species 1 taxa and I rank species 2 taxa. A naturalized plants was 1 species of totaling 290 species appeared in South Korea. The Life-form were Hydatophytes (20.7%), Geophyte (19%), Microphanerophytes (19%), Hemicryptophytes (17.2%), Nanophanerophytes (17.2%), Chamaephytes (5.2%), Therophytes (1.7%). In marsh-type wetland of Mueuido, we predict that bog-type swamp, where various type of swamp plants are distributed, is starting to be formed based on the fact that Utricularia bifida and Utricularia racemosa, insectivorous plants, are dominant and sphagnum also is found. Along with the notion, there are reportedly found serious damages around wetland by human being and we have to prepare protection plans against it.

Analysis of Influences due to Navigation Message Error of GPS Signals on Receiver (GPS 항법메시지 이상이 수신기에 미치는 영향 분석)

  • Kang, Hee-Won;Cho, Deuk-Jae;Park, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2223-2229
    • /
    • 2010
  • The integrity monitoring of anomalous GPS signal have been researched because of the degradation of GPS satellite performance. It is known that anomalous GPS signal can occur by failure of GPS satellite, sudden increase of ionosphere delay error, SA, wrong modeling for navigation parameters from control segment, and an electromagnetic wave interference, etc. In case of GPS anomaly by satellites can arise from carrier frequency, code and navigation message. In this paper, the scenarios with navigation message errors were made by using GPS simulator, and the influences of GPS navigation message error to receiver were analysed. The anomalies of preamble, bits related TOW count message, subframe ID in HOW, bits related satellite healthy, and the other navigation message errors were described and simulated. Also, the number of satellites, DOP and pseudorange are analyzed to know how the anomalous signal can affect on GPS receiver.

UWB RADAR based Modified Adaptive CFAR Algorithm for improved safety of Personal Rapid Transit (무인 궤도 차량의 안전성 제고를 위한 UWB 레이더 기반 적응형 CFAR 알고리즘)

  • Hong, Seok-Gon;Kim, Baek-Hyun;Jeong, Rag-Gyo;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.1
    • /
    • pp.28-42
    • /
    • 2013
  • Personal Rapid Transit(PRT) is a new unmanned transportation system using electricity. The purpose of the PRT is relieving the congestion of city traffic and connecting between inner city and airport, high-speed railroad. PRT requires to develop devices for the guarantee of safety and reliability. PRT as the mean of rail transportation must be equipped with control system for front rail sensing. Ultra Wide Band(UWB) radar system is suitable for PRT's detection because it has the advantage of low power consumption, low interference and high resolution. In this paper, an improved adaptive Constant False Alarm Rate(CFAR) algorithm is proposed and studied in various noise environments. The proposed algorithm improves performance in various noise environments compared to the Mean Level CFAR algorithms and other adaptive CFAR algorithms.

A Study on Moving Object Recognition and Tracking in Unmanned Aerial Camera (공중 무인감시 카메라의 이동물체 인식 및 추적에 관한 연구)

  • Park, Jong-Oh;Kim, Young-Min;Lee, Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.684-690
    • /
    • 2010
  • Digitalized Image Information is variously used like to substitute or help human's visual ability. Unmanned observation Camera is useful for the preventing disaster, risk factor and object observation but it is mostly to depend on awareness for human's vision. The purpose of this paper is to show that Unmanned Aerial Camera carries out object recognition and autonomous position tracking. when the informations about a specific object are given. For this purpose, we have to solve complicated problems like change according to object movement and variation of color and brightness information with refraction, interference and scattering of light and noise from environmental factors like weather. But, as the first step we limit the scope of this study with simplified environment in this paper. Our goal is the study and experience about object recognition and tracking via simplified environment with unmanned aerial camera. We obtained successful results of this study and experiment.

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Robust Obstacle Detection and Avoidance Algorithm for Infrastructure-Based Vehicle Communication Under Signal Interference (중계기를 통한 다중 차량 간 통신 상황에서 신호 간섭에 강한 장애물 감지 및 회피 알고리즘)

  • Choi, Byung Chan;Kwon, Hyuk Chan;Son, Jin Hee;Nam, Haewoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.574-580
    • /
    • 2016
  • In this paper, we will introduce the system that can control multiple vehicles on the road through Single Board Computers and V2I (Vehicle-To-Infrastructure). Also, we will propose the group evasive maneuver decision algorithm, which plays a critical role in deciding whether the vehicles in the system have to conduct evasive maneuvers to avoid obstacles on the road. In order to test this system, we have utilized Wi-Fi and TCP/IP for establishing the communication between multiple vehicles and the relay server, and observed their driving states on the road with obstacles. During the experiments, we have discovered that our original decision algorithm possesses high failure rate when there is frequency interference in ISM (Industrial Scientific Medical) band. In order to reduce this failure rate, we have implemented the data transition detector. This paper will focus on how the use of data transition detector can affect the reliability of the system under the frequency interference of ISM band. If this technology is improved and applied in the field, we will effectively deal with such dangerous situations as multiple collision accidents through vehicle-to-vehicle communication or vehicle-to-infrastructure communication. Furthermore, this can be applied to the autonomous driving technologies. This can be used as the reference data for the development of the similar system.

A Study on the Observation Method of Interaction between Users and Products - With Emphasis on the Video Ethnography of Driver Environment - (사용자-제품 간 인터랙션의 관찰 조사 체계에 관한 연구 - 운전자 환경에서의 비디오 관찰법을 중심으로 -)

  • Kim, Gang-Min;Pan, Young-Hwan;Jeong, Ji-Hong
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • User-centered design aims to develop device naturally without the interference of user' s conscious and unconscious behavior. Accordingly, designers need to understand their user's requirements, observe user behavior and interaction in the real environment. However, existing observations suggested a vast range of analysis system and observation techniques which are often ambiguous to the designers. Therefore, this research is aimed to propose an observation system for collecting data from user's behavior. In order to do so, we define the components and behavior level within the context of driving.

  • PDF