• Title/Summary/Keyword: 수치제어 데이터

Search Result 105, Processing Time 0.031 seconds

High Resolution Radar Model to Simulate Detection/Tracking Performance of Multi-Function Radar in War Game Simulator (통합 교전 시뮬레이터 환경에서 다기능 레이다 탐지/추적 성능 모의를 위한 고해상도 레이다 모델)

  • Rim, Jae-Won;Oh, Suhyun;Koh, Il-Suek
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.70-78
    • /
    • 2019
  • In this paper, modeling of a high-resolution multi-function radar is proposed to simulate radar performance in a war game simulator, called AddSIM. To incorporate the multi-function radar model into the AddSIM, the modeling must comprise a component-based structure consisting of physics, logics, and information blocks. Therefore, we assign the RF hardware of a RADAR as the physic block, a controller as the logics block, and the RF specifications of the RADAR as the information block. Detailed modeling of the physics and logics blocks are addressed, and data structure is also presented on an engineering level. On a multi-target engaged scenario, the performance of the multi-function radar is numerically analyzed and its validation is examined.

BER Performance of DS/CDMA-BPSK Systemin 3-State Land Mobile Satellite fading Channel (3-상태 육상이동위성 페이딩 채널에서 DS/CDMA-BPSK 시스템의 오율 성능)

  • Cho, Sung-Eon;Cho, Kyung-Ryong;Yeo, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.795-804
    • /
    • 1999
  • The increasing number of users of mobile communication systems and the corresponding need for increased system capacity require the use of a modulation scheme which is both power and spectrally efficient. In this paper, we numerically calculate the BER performance of DS/CDMA-BPSK system in different fading channel (Rayleigh, Rician, Shadow Rician). Also, we calculate BER performance and the channel capacity of DS/CDMA-BPSK system which is constant or nearly constant envelopes in 3-state fading channel model. The Shadow Rician fading model described in this paper apply the parameters of the Canadian Mobile Satellite (MSAT). And we assume that the 3-state fading channel model is consist of Rayleigh fading state, Rician fading state, and shadow Rician fading state. This model can be used as a basis for the simulation of the land mobile satellite channel. The dynamic 3-state fading channel model is considered corresponding to different environments and the transitions between these environments. From the numerically calculate results, the DS/CDMA-BPSK system with MUI-20, PG-511 can not achieve the BER performance ($P_b\leq10^{-5}$). And the channel capacity did not meet the system requirement. Also, we know that the BER performance is depend m the occupancy probability of radio channel and the degree of shadow. From the results, we how that during shadowed time intervals it is necessary to use some form of error control coding and receiver diversity in order to support reliable data communication.

  • PDF

Performance Evaluation of Multi-User Detectors Employing Subtractive Interference Cancellation Schemes for a DS-CDMA System (감산형 간섭제거기법을 적용한 DS-CDMA 다중사용자 검파기의 성능분석)

  • Seo, Jung-Wook;Kim, Young-Chul;Oh, Chang-Heon;Ko, Bong-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.17-26
    • /
    • 2002
  • In this paper, we have analyzed the BER (Bit Error Rate) performance of multi-user detectors employing SIC(Successive Interference Cancellation) and PIC (Parallel Interference Cancellation) which are the representative schemes in the subtractive interference cancellation. We have considered the MUD structure employing HIC (Hybrid Interference Cancellation) which combines SIC with PIC scheme, and then analyzed the BER performance. We have evaluated the BER performance of SIC and HIC schemes which execute the soft decision to generate the tentative data bit for the purpose of the interference cancellation in MAI and noise environments. Through the numerical analysis and computer simulation, it is shown that HIC can remove the effect of MAI more efficiently than the others, that improve the BER performance and increase the capacity of DS-CDMA systems regardless of the power control conditions. The reason is that the SIC scheme in front of HIC can solve the near-far problem caused by the imperfect power control and PIC scheme in the rear of it can improve the performance much more.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

The Prediction System of Emotional Reaction to Gaits Using MAX SCRIPT (맥스 스크립트를 이용한 감성적 걸음걸이 예측 시스템)

  • Jeong, Jae-Wook
    • Science of Emotion and Sensibility
    • /
    • v.14 no.1
    • /
    • pp.1-6
    • /
    • 2011
  • A perceptual reaction to human being's gaits has "regularity" that possibly obtains sympathy among people. This thesis is in the vein of the study that performs the research on the quantificational extraction of the regularity, reconstitute the result, and apply it to controlling behavior. The purpose of this thesis lies in assuring the validity of the future research by demonstrating the following hypothesis: when the physical numerical values of the gait "A" whose perceptual reaction is "a" and those of the gait "B" whose perceptual reaction is "b" are arbitrarily blended, the perceptual reaction to this blended gait also corresponds to the blend of "a" and "b", "a/b". I blended the samples of two types of gaits in the form of Bipeds using the EAM made by 3D Studio Max Script. Blending outcomes were obtained successfully for four times out of the six tries in total. It implies that without utilizing other methods such as Motion Capturing, the basic Bipeds data itself has an enough capability to generate various gaits of Bipeds. Although the present research targets only the Bipeds samples equipped with the 1Cycle moving condition of arms and legs, I acknowledge that a tool that makes blending possible under various moving conditions is necessary for a completed system.

  • PDF

A Study on Shape Optimization and Hemolysis Evaluation of Axial Flow Blood Pump by Using Computational Fluid Dynamics Analysis (CFD해석을 이용한 축류형 혈액펌프의 용혈평가 및 형상개량에 관한 기초연구)

  • 김동욱;임상필
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.57-64
    • /
    • 2004
  • The non pulsation blood pump is divided into axial flow and centrifugal style according to the direction of inlet and outlet flow. An axial flow blood pump can be made smaller than a centrifugal blood pump because centrifugal pump's rpm is fewer than axial flow pump. Hemolysis is an important factor for the development of an axial flow blood pump. It is difficult to identify the areas where hemolysis occurs. Evaluation of hemolysis both in in-vitro and in-vivo test requires a long-time and more expensive. Computational fluid dynamics(CFD) analysis enables the engineer to predict hemolysis on a computer which just can get not only amount of htmolysis but also location of hemolysis. It takes shorter time and less expensive than in-vitro test. The purpose of this study is to git Computational fluid dynamics in axial flow pump and to verify the accuracy of prediction by the possibility of design comparing CFD results with in-vitro experimental results. Also, wish to figure out the correction method that can bring improvement in shape of axial flow blood pump using CFD analysis.

Android Malware Analysis Technology Research Based on Naive Bayes (Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1087-1097
    • /
    • 2017
  • As the penetration rate of smartphones increases, the number of malicious codes targeting smartphones is increasing. I 360 Security 's smartphone malware statistics show that malicious code increased 437 percent in the first quarter of 2016 compared to the fourth quarter of 2015. In particular, malicious applications, which are the main means of distributing malicious code on smartphones, are aimed at leakage of user information, data destruction, and money withdrawal. Often, it is operated by an API, which is an interface that allows you to control the functions provided by the operating system or programming language. In this paper, we propose a mechanism to detect malicious application based on the similarity of API pattern in normal application and malicious application by learning pattern of API in application derived from static analysis. In addition, we show a technique for improving the detection rate and detection rate for each label derived by using the corresponding mechanism for the sample data. In particular, in the case of the proposed mechanism, it is possible to detect when the API pattern of the new malicious application is similar to the previously learned patterns at a certain level. Future researches of various features of the application and applying them to this mechanism are expected to be able to detect new malicious applications of anti-malware system.

The Construction of QoS Integration Platform for Real-time Negotiation and Adaptation Stream Service in Distributed Object Computing Environments (분산 객체 컴퓨팅 환경에서 실시간 협약 및 적응 스트림 서비스를 위한 QoS 통합 플랫폼의 구축)

  • Jun, Byung-Taek;Kim, Myung-Hee;Joo, Su-Chong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3651-3667
    • /
    • 2000
  • Recently, in the distributed multimedia environments based on internet, as radical growing technologies, the most of researchers focus on both streaming technology and distributed object thchnology, Specially, the studies which are tried to integrate the streaming services on the distributed object technology have been progressing. These technologies are applied to various stream service mamgements and protocols. However, the stream service management mexlels which are being proposed by the existing researches are insufficient for suporting the QoS of stream services. Besides, the existing models have the problems that cannot support the extensibility and the reusability, when the QoS-reiatedfunctions are being developed as a sub-module which is suited on the specific-purpose application services. For solving these problems, in this paper. we suggested a QoS Integrated platform which can extend and reuse using the distributed object technologies, and guarantee the QoS of the stream services. A structure of platform we suggested consists of three components such as User Control Module(UCM), QoS Management Module(QoSM) and Stream Object. Stream Object has Send/Receive operations for transmitting the RTP packets over TCP/IP. User Control ModuleI(UCM) controls Stream Objects via the COREA service objects. QoS Management Modulel(QoSM) has the functions which maintain the QoS of stream service between the UCMs in client and server. As QoS control methexlologies, procedures of resource monitoring, negotiation, and resource adaptation are executed via the interactions among these comiXments mentioned above. For constmcting this QoS integrated platform, we first implemented the modules mentioned above independently, and then, used IDL for defining interfaces among these mexlules so that can support platform independence, interoperability and portability base on COREA. This platform is constructed using OrbixWeb 3.1c following CORBA specification on Solaris 2.5/2.7, Java language, Java, Java Media Framework API 2.0, Mini-SQL1.0.16 and multimedia equipments. As results for verifying this platform functionally, we showed executing results of each module we mentioned above, and a numerical data obtained from QoS control procedures on client and server's GUI, while stream service is executing on our platform.

  • PDF

Misconception on the Yellow Sea Warm Current in Secondary-School Textbooks and Development of Teaching Materials for Ocean Current Data Visualization (중등학교 교과서 황해난류 오개념 분석 및 해류 데이터 시각화 수업자료 개발)

  • Su-Ran Kim;Kyung-Ae Park;Do-Seong Byun;Kwang-Young Jeong;Byoung-Ju Choi
    • Journal of the Korean earth science society
    • /
    • v.44 no.1
    • /
    • pp.13-35
    • /
    • 2023
  • Ocean currents play the most important role in causing and controlling global climate change. The water depth of the Yellow Sea is very shallow compared to the East Sea, and the circulation and currents of seawater are quite complicated owing to the influence of various wind fields, ocean currents, and river discharge with low-salinity seawater. The Yellow Sea Warm Current (YSWC) is one of the most representative currents of the Yellow Sea in winter and is closely related to the weather of the southwest coast of the Korean Peninsula, so it needs to be treated as important in secondary-school textbooks. Based on the 2015 revised national educational curriculum, secondary-school science and earth science textbooks were analyzed for content related to the YSWC. In addition, a questionnaire survey of secondary-school science teachers was conducted to investigate their perceptions of the temporal variability of ocean currents. Most teachers appeared to have the incorrect knowledge that the YSWC moves north all year round to the west coast of the Korean Peninsula and is strong in the summer like a general warm current. The YSWC does not have strong seasonal variability in current strength, unlike the North Korean Cold Current (NKCC), but does not exist all year round and appears only in winter. These errors in teachers' subject knowledge had a background similar to why they had a misconception that the NKCC was strong in winter. Therefore, errors in textbook contents on the YSWC were analyzed and presented. In addition, to develop students' and teachers' data literacy, class materials on the YSWC that can be used in inquiry activities were developed. A graphical user interface (GUI) program that can visualize the sea surface temperature of the Yellow Sea was introduced, and a program displaying the spatial distribution of water temperature and salinity was developed using World Ocean Atlas (WOA) 2018 oceanic in-situ measurements of water temperature and salinity data and ocean numerical model reanalysis field data. This data visualization materials using oceanic data is expected to improve teachers' misunderstandings and serve as an opportunity to cultivate both students and teachers' ocean and data literacy.

(A Scalable Multipoint-to-Multipoint Routing Protocol in Ad-Hoc Networks) (애드-혹 네트워크에서의 확장성 있는 다중점 대 다중점 라우팅 프로토콜)

  • 강현정;이미정
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.329-342
    • /
    • 2003
  • Most of the existing multicast routing protocols for ad-hoc networks do not take into account the efficiency of the protocol for the cases when there are large number of sources in the multicast group, resulting in either large overhead or poor data delivery ratio when the number of sources is large. In this paper, we propose a multicast routing protocol for ad-hoc networks, which particularly considers the scalability of the protocol in terms of the number of sources in the multicast groups. The proposed protocol designates a set of sources as the core sources. Each core source is a root of each tree that reaches all the destinations of the multicast group. The union of these trees constitutes the data delivery mesh, and each of the non-core sources finds the nearest core source in order to delegate its data delivery. For the efficient operation of the proposed protocol, it is important to have an appropriate number of core sources. Having too many of the core sources incurs excessive control and data packet overhead, whereas having too little of them results in a vulnerable and overloaded data delivery mesh. The data delivery mesh is optimally reconfigured through the periodic control message flooding from the core sources, whereas the connectivity of the mesh is maintained by a persistent local mesh recovery mechanism. The simulation results show that the proposed protocol achieves an efficient multicast communication with high data delivery ratio and low communication overhead compared with the other existing multicast routing protocols when there are multiple sources in the multicast group.