• Title/Summary/Keyword: Address time

Search Result 1,685, Processing Time 0.114 seconds

Kinematical Analysis of Swing Motion with Golf Iron Clubs Used by Elite Golfers (우수 골퍼의 아이언 클럽 스윙동작에 대한 운동학적 분석)

  • Kim, Kab-Sun
    • Korean Journal of Applied Biomechanics
    • /
    • v.18 no.2
    • /
    • pp.85-94
    • /
    • 2008
  • The purpose of this study is to provide basic materials for amateur golf players or golf maniacs to learn desirable iron swing motions. This study compared and analyzed the swing motions of iron clubs(3, 6, 9) by using 3-D in three elite golf players. 1. There was no a great difference in the total of swing time by club and the time by phase was nearly similar. 2. There was no a difference in the change in a head location at address and impact by club. 3. The angle change in a right knee joint was similar by club except the difference according to the length of the club. 4. There was a subtle difference in hip rotation angle by club. 5. In each club, the same rotation angle of shoulder joint at address and impact motions contributed to accurate swing, and the maintenance of more than $90^{\circ}$ of shoulder rotation angle in top swing increased swing rotation. 6. Although subtle, the forward angle of upper body was increased with a shorter club. $30-36^{\circ}$ of forward angle of upper body was maintained at address, top swing, and impact motions.

A Non-Periodic Synchronization Algorithm using Address Field of Point-to-Point Protocol in CDMA Mobile Network (CDMA이동망에서 점대점 프로토콜의 주소영역을 이용한 비주기적 동기 알고리즘)

  • Hong, Jin-Geun;Yun, Jeong-O;Yun, Jang-Heung;Hwang, Chan-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.918-929
    • /
    • 1999
  • 동기식 스트림 암호통신 방식을 사용하는 암호통신에서는 암/복호화 과정 수행시 암호통신 과정에서 발생하는 사이클슬립으로 인해 키수열의 동기이탈 현상이 발생되고 이로 인해 오복호된 데이타를 얻게된다. 이러한 위험성을 감소하기 위한 방안으로 현재까지 암호문에 동기신호와 세션키를 주기적으로 삽입하여 동기를 이루는 주기적인 동기암호 통신방식을 사용하여 왔다. 본 논문에서는 CDMA(Cellular Division Multiple Access) 이동망에서 데이타서비스를 제공할 때 사용되는 점대점 프로토콜의 주소영역의 특성을 이용하여 단위 측정시간 동안 측정된 주소비트 정보와 플래그 패턴의 수신률을 이용하여 문턱 값보다 작은경우 동기신호와 세션키를 전송하는 비주기적인 동기방식을 사용하므로써 종래의 주기적인 동기방식으로 인한 전송효율성 저하와 주기적인 상이한 세션키 발생 및 다음 주기까지의 동기이탈 상태의 지속으로 인한 오류확산 등의 단점을 해결하였다. 제안된 알고리즘을 링크계층의 점대점 프로토콜(Point to Point Protocol)을 사용하는 CDMA 이동망에서 동기식 스트림 암호 통신방식에 적용시 동기이탈율 10-7의 환경에서 주기가 1sec인 주기적인 동기방식에서 요구되는 6.45x107비트에 비해 3.84x105비트가 소요됨으로써 전송율측면에서의 성능향상과 오복호율과 오복호 데이타 비트측면에서 성능향상을 얻었다. Abstract In the cipher system using the synchronous stream cipher system, encryption / decryption cause the synchronization loss (of key arrangement) by cycle slip, then it makes incorrect decrypted data. To lessen the risk, we have used a periodic synchronous cipher system which achieve synchronization at fixed timesteps by inserting synchronization signal and session key. In this paper, we solved the problem(fault) like the transfer efficiency drops by a periodic synchronous method, the periodic generations of different session key, and the incorrectness increases by continuing synchronization loss in next time step. They are achieved by the transfer of a non-periodic synchronous signal which carries synchronous signal and session key when it is less than the threshold value, analyzing the address field of point-to-point protocol, using the receiving rate of address bits information and flag patterns in the decision duration, in providing data services by CDMA mobile network. When the proposed algorithm is applied to the synchronous stream cipher system using point-to-point protocol, which is used data link level in CDMA mobile network, it has advanced the result in Rerror and Derror and in transmission rate, by the use of 3.84$\times$105bits, not 6.45$\times$107bits required in periodic synchronous method, having lsec time step, in slip rate 10-7.

A Study on Implementation and Design of Secure VOD System (Secure-VOD 시스템의 설계 및 구현에 관한 연구)

  • 한성민;유황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.700-707
    • /
    • 2000
  • In this paper, we address vulnerabilities of legacy VOD system and implement secure-VOD system to protect security holes of it. Our secure-VOD system provide user authentication using one-time password, message authentication and encryption/decryption for video server information. To improve security of existing fixed password system, our secure-VOD system use one-time password. Also, our secure-VOD system provides integrity for video server information by generating and verifying message authentication code using HMAC-HAS 160 algorithm. Finally, our secure-VOD system uses RC5 encryption algorithm to guarantee confidentiality for video server information.

  • PDF

Attitude Dynamics Identification of Unmanned Aircraft Vehicle

  • Salman Shaaban Ali;Sreenatha Anavatti G.;Choi, Jin-Young
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.6
    • /
    • pp.782-787
    • /
    • 2006
  • The role of Unmanned Aircraft Vehicles(UAVs) has been increasing significantly in both military and civilian operations. Many complex systems, such as UAVs, are difficult to model accurately because they exhibit nonlinearity and show variations with time. Therefore, the control system must address the issues of uncertainty, nonlinearity, and complexity. Hence, identification of the mathematical model is an important process in controller design. In this paper, attitude dynamics identification of UAV is investigated. Using the flight data, nonlinear state space model for attitude dynamics of UAV is derived and verified. Real time simulation results show that the model dynamics match experimental data.

A Strategy of Pedestrian Environment Improvement through the Analysis on the Walking Transportation Characteristics in a Big City (보행통행 특성분석에 의한 보행환경개선 추진전략 연구)

  • 김형보;윤항묵
    • Journal of Korean Port Research
    • /
    • v.14 no.3
    • /
    • pp.269-278
    • /
    • 2000
  • Today the pedestrian-related problems a key subject requiring the attention of the traffic engineers for improving the transportation system. Particularly in urban and CBD locations, the pedestrian presents an element of sharp conflict with vehicular traffic. Therefore pedestrian movements must be studied for the purpose of providing guideline for the design and operation of walking transportation systems. This paper is to address the characteristics of walking transportation in a big city. Especially the focuses are emphasized on the ratio occupied by pedestrian traffic among the whole unlinked trips in a city and walking time. The data for analysis are collected in Seoul metropolitan city through sampling 1,006 citizens. Compared with other similar research works this paper utilized diversified tools to acquire more useful results. Finally, policy directions for pedestrian environment improvement were suggested.

  • PDF

Minimization of Inspection Cost in an Inspection System Using a Time-based Flow Analysis

  • Yang, Moon-Hee;Kim, Sun-Uk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.35 no.3
    • /
    • pp.194-202
    • /
    • 2009
  • In this paper, we address an optimization problem and a case study for minimizing the cost of inspections incurred throughout an inspection system, which includes a K-stage inspection system, a source inspection shop, and a re-inspection shop. In order to formulate the inspection cost function, we make a time-based flow analysis between nodes (or shops), and derive the limiting sizes of flows between nodes and limiting defective rates by solving a set of nonlinear balance equations. It turns out that the number of items reworked throughout the inspection system is invariant irrespective of the defective rate of items moved through the K-stage inspection system. Hence we define the inspection cost as the total number of items inspected, and we provide an enumeration method for determining an optimal value of K which minimizes the number of items inspected.

A Technique to Enhance Performance of Log-based Flash Memory File Systems (로그기반 플래시 메모리 파일 시스템 성능 향상 기법)

  • Ryu, Junkil;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.184-193
    • /
    • 2007
  • Flash memory adoption in the mobile devices is increasing or vanous multimedia services such as audio, videos, and games. Although the traditional research issues such as out-place update, garbage collection, and wear-leveling are important, the performance, memory usage, and fast mount issues of flash memory file system are becoming much more important than ever because flash memory capacity is rapidly increasing. In this paper, we address the problems of the existing log-based flash memory file systems analytically and propose an efficient log-based file system, which produces higher performance, less memory usage and mount time than the existing log-based file systems. Our ideas are applied to a well-known log-based flash memory file system (YAFFS2) and the performance tests are conducted by comparing our prototype with YAFFS2. The experimental results show that our prototype achieves higher performance, less system memory usage, and faster mounting than YAFFS2, which is better than JFFS2.

  • PDF

Smart Phone Based Image Processing Methods for Motion Detection of a Moving Object via a Network Camera (네트워크 카메라의 움직이는 물체 감지를 위한 스마트폰 기반 영상처리 방법)

  • Kim, Young Jin;Kim, Dong Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.1
    • /
    • pp.65-71
    • /
    • 2013
  • In this work, new smart phone based moving target detection is proposed. In order to implement the task, methods of real time image transmission from network camera, motion detecting algorithm and its effective implementation are also addressed. The network camera transfers image data by MJPEG format which contains various information such as data and IP address, and the smart phone separates the image data received through a WiFi module. Later, the image data is converted to a Bitmap image format, and with the help of the embedded OpenCV library on a smart phone and algorithm, it was found that the moving object was identified effectively in terms of real time monitoring and detection.

A File System for Large-scale NAND Flash Memory Based Storage System

  • Son, Sunghoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.1-8
    • /
    • 2017
  • In this paper, we propose a file system for flash memory which remedies shortcomings of existing flash memory file systems. Besides supporting large block size, the proposed file system reduces time in initializing file system significantly by adopting logical address comprised of erase block number and bitmap for pages in the block to find a page. The file system is suitable for embedded systems with limited main memory since it has small in-memory data structures. It also provides efficient management of obsolete blocks and free blocks, which contribute to the reduction of file update time. Finally the proposed file system can easily configure the maximum file size and file system size limits, which results in portability to emerging larger flash memories. By conducting performance evaluation studies, we show that the proposed file system can contribute to the performance improvement of embedded systems.

A Study on the Visualization of HNS Hazard Levels to Prevent Accidents at Sea in Real-Time

  • Jeong, Min-Gi;Lee, Moonjin;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.3
    • /
    • pp.242-249
    • /
    • 2017
  • In order to develop an HNS safety management system to assess and visualize hazard levels via an automated method, we have conceptualized and configured a sample system. It is designed to quantify the risk of a vessel carrying HNS with a matrix method along navigational route and indicate hazards distribution with a contour map. The basic system which provides a visualized degree of hazards in real time has been introduced for the safe navigation of HNS ships. This is useful not only for decision making and circumstantial judgment but may also be utilized for HNS safety management with a risk base. Moreover, this system could be extended to address the navigational safety of marine traffic as well as of autonomous vessels in the near future if the sensors used are connected with IoT technology.