• Title/Summary/Keyword: 확장 W-Method

Search Result 81, Processing Time 0.027 seconds

Design and Performance of Synchronization in the MIMO/W-OFDM Modulation System for 5G Mobile Communication (5G 이동 통신을 위한 W-OFDM 변조방식의 MIMO 시스템에서 동기화 시스템 설계와 성능 평가)

  • An, Changyoung;Ryu, Heung-Gyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.3-10
    • /
    • 2017
  • In this paper, we have designed a MIMO system using a W-OFDM modulation scheme. And then, we have evaluated and analyzed synchronization performance of the system. In this paper, we have considered Schmidl's method, Minn's method, and Park's method. As simulation results, Schmidl's method has wide plateau of timing metric and Park's method has impulse-shape timing metric. Also, we can confirm that timing metric characteristic of synchronization estimator is not changed by adjusting extension length of W-OFDM system. Because of this, we can confirm that synchronization method of OFDM can be effectively used in MIMO system using W-OFDM modulation.

The Construction Method on the Arch-type Anchor Block by means of Hight-adjustable Auger-crane with Hydraulic Expansion (신축형 오거크레인용 유압식 확장기를 이용한 아치형 전주근가 시공법)

  • Kim, J.S.;Kwon, S.W.;Park, Y.B.;Kwon, S.W.;Mun, S.W.;Cho, S.M.;Kim, D.Y.;Kwon, Y.M.
    • Proceedings of the KIEE Conference
    • /
    • 2008.04b
    • /
    • pp.19-21
    • /
    • 2008
  • 현행 배전선로의 전주근가(1.2m 장방형)는 오거크레인을 이용한 건주공사 완료 후 전주근가 시공을 위한 별도의 인력 또는 백호우 장비가 추가로 투입피어 시공함으로써 인력으로는 공사시간이 장기간 소요되고 백호우장비로는 작업장 환경훼손과 시공원가 상승의 문제점이 있었다. 이러한 문제점을 해소하기 위하여 건주공사에 사용되는 오거크레인의 굴착 직경을 80cm까지 확장 가능한 '신축형 오거크레인용 유압식 확장기'와 원형 굴착공에 시공이 가능한 '아치형 전주근가'를 개발하고 이를 이용한 시공기술을 개발함으로써 동일장소에서 굴착작업이 수반되는 건주작업, 전주근가 매설작업을 가능하게 하여 장비활용성 증대, 작업장 환경개선, 공사기간 단축 및 시공원가 절감 등의 효과가 기대되는 기술을 개발하였다.

  • PDF

Modeling and Digital Predistortion Design of RF Power Amplifier Using Extended Memory Polynomial (확장된 메모리 다항식 모델을 이용한 전력 증폭기 모델링 및 디지털 사전 왜곡기 설계)

  • Lee, Young-Sup;Ku, Hyun-Chul;Kim, Jeong-Hwi;Ryoo, Kyoo-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.11
    • /
    • pp.1254-1264
    • /
    • 2008
  • This paper suggests an extended memory polynomial model that improves accuracy in modeling memory effects of RF power amplifiers(PAs), and verifies effectiveness of the suggested method. The extended memory polynomial model includes cross-terms that are products of input terms that have different delay values to improve the limited accuracy of basic memory polynomial model that includes the diagonal terms of Volterra kernels. The complexity of the memoryless model, memory polynomial model, and the suggested model are compared. The extended memory polynomial model is represented with a matrix equation, and the Volterra kernels are extracted using least square method. In addition, the structure of digital predistorter and digital signal processing(DSP) algorithm based on the suggested model and indirect learning method are proposed to implement a digital predistortion linearization. To verify the suggested model, the predicted output of the model is compared with the measured output for a 10W GaN HEMT RF PA and 30 W LDMOS RF PA using 2.3 GHz WiBro input signal, and adjacent-channel power ratio(ACPR) performance with the proposed digital predistortion is measured. The proposed model increases model accuracy for the PAs, and improves the linearization performance by reducing ACPR.

A Study on Modeling Heterogeneous Embedded S/W Components based on Model Driven Architecture with Extended xUML (확장된 xUML을 사용한 MDA 기반 이종 임베디드 소프트웨어 컴포넌트 모델링에 관한 연구)

  • Kim, Woo-Yeol;Kim, Young-Chul
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.83-88
    • /
    • 2007
  • In this paper, we introduce MDA based Development Method for Embedded Software Component. This method applies MDA approach to solve problems about reusability of the heterogeneous embedded software system. With our proposed method, we produce 'Target Independent Meta Model'(TIM) which is transformed into 'Target Specific Model'(TSM) and generate 'Target Dependent Code' (TDC) via TSM. We would like to reuse a meta-model to develop heterogeneous embedded software systems. To achieve this mechanism, we extend xUML to solve unrepresented elements (such as real things about concurrency, and real time, etc) on dynamic modeling of the particular system. We introduce 'MDA based Embedded S/W Modeling Tool' with extended XUML. With this tool, we would like to do more easily modeling embedded or concurrent/real time s/w systems. It contains two examples of heterogeneous imbedded systems which illustrate the proposed approach.

A Model-based Test Approach and Case Study for Weapon Control System (모델기반 테스트 기법 및 무장통제장치 적용 사례)

  • Bae, Jung Ho;Jang, Bucheol;Koo, Bongjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.688-699
    • /
    • 2017
  • Model-based test, a well-known method of the black box tests, is consisted of the following four steps : model construction using requirement, test case generation from the model, execution of a SUT (software under test) and detection failures. Among models constructed in the first step, state-based models such as UML standard State Machine are commonly used to design event-based embedded systems (e.g., weapon control systems). To generate test cases from state-based models in the next step, coverage-based techniques such as state coverage and transition coverage are used. Round-trip path coverage technique using W-Method, one of coverage-based techniques, is known as more effective method than others. However it has a limitation of low failure observability because the W-Method technique terminates a testing process when arrivals meet states already visited and it is hard to decide the current state is completely same or not with the previous in the case like the GUI environment. In other words, there can exist unrevealed faults. Therefore, this study suggests a Extended W-Method. The Extended W-Method extends the round-trip path to a final state to improve failure observability. In this paper, we compare effectiveness and efficiency with requirement-item-based technique, W-Method and our Extended W-Method. The result shows that our technique can detect five and two more faults respectively and has the performance of 28 % and 42 % higher failure detection probability than the requirement-item-based and W-Method techniques, respectively.

NFC Handover Technology for W-USB (W-USB를 위한 NFC Handover 기술)

  • Han, Young-Sun;Kim, Tae-Seon
    • The KIPS Transactions:PartA
    • /
    • v.17A no.3
    • /
    • pp.137-144
    • /
    • 2010
  • Recently, as the consumer market of the mobile device is explosively getting bigger and bigger, both of the usability and applicability of the mobile device are also growing rapidly. The customers prefer to transfer data between the different mobile devices and download multimedia data via the wireless connection even wherever they are. The trend of mobile devices also shows the tendency of employing the various connectivity technologies such as Bluetooth, Wi-Fi, W-USB, NFC, and so on in a single mobile device. With this market trend, the importance of the technology associating different devices is getting increased gradually. In this paper, we present how to support the NFC association of the W-USB technology by extending the existing NFC's handover protocol. We also explain the differences between the NFC association and the handover protocol, and propose the method to resolve the differences by extending the handover protocol of the NFC technology. Finally, we describe how to implement the NFC system supporting the W-USB handover protocol.

Query Language Extension and Implementation of MM Presentation System using SMIL in MMDB (멀티미디어 데이터베이스에서 SMIL을 이용한 질의어 확장 및 프리젠테이션 시스템의 구현)

  • 이중화;이종환;유영호;김경석
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.44-53
    • /
    • 2001
  • It is very important how users query MM data and how the query results are presented in MMDB systems. Also, the query results are represented as the generalized form so as to be used in various applications. In this paper, we propose a generalized method for querying and presenting MM data by extending query language based on presentation elements of SMIUSMIL is W3C recommendation for synchronized MM presentation). Our system provides the query results for users as SMIL format in order to be used for various applications.

  • PDF

Silicon Based Millimeter-Wave Phased Array System (실리콘 기반의 고주파 위상 배열 시스템에 관한 연구)

  • Kang, Dong-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.1
    • /
    • pp.130-136
    • /
    • 2014
  • This paper reviews the research on silicon based phased array system operating from microwave to millimeter wave frequencies. First, the design of phase shifter using CMOS technology is presented. The passive phase shifter is applied to the transmit/receive module from one to 16 channel in a single chip. The 35 GHz 4-element T/R module consumes less than 200 mW both transmit and receive modes. The architecture can extend to 16-channel operating at 44 GHz, thereby improving transmit power and linearity. The Ku-band 2-antenna 4-element receiver was developed using active phase shifter based on vector sum method. It is important to minimize coupling between beams because the chip contains four independent beams. The method of coupling is presented and verified.

Comparative Analysis of Blockchain Systems According to Validator Set Formation Method (검증자 집합 형성 방법에 따른 블록체인 시스템 비교 분석)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.41-46
    • /
    • 2019
  • Recently, the Byzantine Fault Tolerance(BFT) family of consensus algorithms has been attracting attention as the problems of the Proof-of-work (PoW) blockchain consensus algorithms result in energy waste and lack of scalability. One of the great features of the PBFT family consensus algorithms is the formation of a set of validators and consensus within them. In this paper, we compared and analyzed the scalability, targeted attackability, and civil attackability of Algorand, Stellar, and EOS validator set formation methods among BFT family consensus algorithms. Also, we found the problems of each verifier formation method through data analysis, and the consensus algorithms showed that the centralization phenomenon that the few powerful nodes dominate the whole system in common.

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.