• Title/Summary/Keyword: Algorithm Model

Search Result 12,926, Processing Time 0.047 seconds

A Study for Co-channel Interference Cancelation Algorithm with Channel Estimation for WBAN System Application (WBAN 환경에서 채널 추정 기반의 공용 채널 간섭 제거 기술)

  • Choi, Won-Seok;Kim, Jeong-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.476-482
    • /
    • 2012
  • In this paper, we analyze and compare several co-channel interference mitigation algorithms for WBAN application in 2.4 GHz ISM frequency bands. ML (Maximum Likelihood), OC (Optimal Combining) and MMSE (Minimum Mean Square Error) has been considered for the possible techniques for interference cancellation in view of the trade off between the performance and the complexity of implementation. Based on the channel model of IEEE 802.15.6 standard, simulation results show that ML and OC attains the lower BER performance than that of MMSE if we assume the perfect channel estimation. But, ML and OC have the additional requirement of implementation for his own and other users's channel estimation process, hence, besides the BER performance, the complexity of implementation and the sensitivity to channel estimation error should be considered since it requires the simple and small sized equipment for WBAN system application. In addition, the gap of detection BER performance between ML, OC and MMSE is much decreased under the imperfect channel estimation if we adopt real channel estimation process, therefore, in order to apply to WBAN system, the trade off between the BER performance and complexity of implemetation should be seriously considered to decide the best co-channel interference cancellation for WBAN system application.

Two-Dimensional Magnetotelluric Interpretation by Finite-Element Method (유한요소법에 의한 MT 법의 2차원 해석)

  • Kim, Hee-Joon;Choi, Ji-Hyang;Han, Nu-Ree;Lee, Seong-Kon;Song, Yoon-Ho
    • Geophysics and Geophysical Exploration
    • /
    • v.11 no.2
    • /
    • pp.85-92
    • /
    • 2008
  • Magnetotelluric (MT) methods are widely applied as an effective exploration technique to geothermal surveys. Two-dimensional (2-D) analysis is frequently used to investigate a complicated subsurface structure in a geothermal region. A 2-D finite-element method (FEM) is usually applied to the MT analysis, but we must pay attention to the accuracy of so-called auxiliary fields. Rodi (1976) proposed an algorithm of improving the accuracy of auxiliary fields, and named it as the MOM method. Because it introduces zeros into the diagonal elements of coefficient matrix of the FEM total equation, a pivoting procedure applied to the symmetrical band matrix makes the numerical solution far less efficient. The MOM method was devised mainly for the inversion analysis, in which partial derivatives of both electric and magnetic fields with respect to model parameters are required. In the case of forward modeling, however, we do not have to resort to the MOM method; there is no need of modifying the coefficient matrix, and the auxiliary fields can be elicited from the regular FEM solution. The computational efficiency of the MOM method, however, can be greatly improved through a sophisticated rearrangement of the total equation.

Welfare Interface using Multiple Facial Features Tracking (다중 얼굴 특징 추적을 이용한 복지형 인터페이스)

  • Ju, Jin-Sun;Shin, Yun-Hee;Kim, Eun-Yi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.75-83
    • /
    • 2008
  • We propose a welfare interface using multiple fecial features tracking, which can efficiently implement various mouse operations. The proposed system consist of five modules: face detection, eye detection, mouth detection, facial feature tracking, and mouse control. The facial region is first obtained using skin-color model and connected-component analysis(CCs). Thereafter the eye regions are localized using neutral network(NN)-based texture classifier that discriminates the facial region into eye class and non-eye class, and then mouth region is localized using edge detector. Once eye and mouth regions are localized they are continuously and correctly tracking by mean-shift algorithm and template matching, respectively. Based on the tracking results, mouse operations such as movement or click are implemented. To assess the validity of the proposed system, it was applied to the interface system for web browser and was tested on a group of 25 users. The results show that our system have the accuracy of 99% and process more than 21 frame/sec on PC for the $320{\times}240$ size input image, as such it can supply a user-friendly and convenient access to a computer in real-time operation.

Locating Microseismic Events using a Single Vertical Well Data (단일 수직 관측정 자료를 이용한 미소진동 위치결정)

  • Kim, Dowan;Kim, Myungsun;Byun, Joongmoo;Seol, Soon Jee
    • Geophysics and Geophysical Exploration
    • /
    • v.18 no.2
    • /
    • pp.64-73
    • /
    • 2015
  • Recently, hydraulic fracturing is used in various fields and microseismic monitoring is one of the best methods for judging where hydraulic fractures exist and how they are developing. When locating microseismic events using single vertical well data, distances from the vertical array and depths from the surface are generally decided using time differences between compressional (P) wave and shear (S) wave arrivals and azimuths are calculated using P wave hodogram analysis. However, in field data, it is sometimes hard to acquire P wave data which has smaller amplitude than S wave because microseismic data often have very low signal to noise (S/N) ratio. To overcome this problem, in this study, we developed a grid search algorithm which can find event location using all combinations of arrival times recorded at receivers. In addition, we introduced and analyzed the method which calculates azimuths using S wave. The tests of synthetic data show the inversion method using all combinations of arrival times and receivers can locate events without considering the origin time even using only single phase. In addition, the method can locate events with higher accuracy and has lower sensitivity on first arrival picking errors than conventional method. The method which calculates azimuths using S wave can provide reliable results when the dip between event and receiver is relatively small. However, this method shows the limitation when dip is greater than about $20^{\circ}$ in our model test.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

GPS/INS Integration and Preliminary Test of GPS/MEMS IMU for Real-time Aerial Monitoring System (실시간 공중 자료획득 시스템을 위한 GPS/MEMS IMU 센서 검증 및 GPS/INS 통합 알고리즘)

  • Lee, Won-Jin;Kwon, Jay-Hyoun;Lee, Jong-Ki;Han, Joong-Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.2
    • /
    • pp.225-234
    • /
    • 2009
  • Real-time Aerial Monitoring System (RAMS) is to perform the rapid mapping in an emergency situation so that the geoinformation such as orthophoto and/or Digital Elevation Model is constructed in near real time. In this system, the GPS/INS plays an very important role in providing the position as well as the attitude information. Therefore, in this study, the performance of an IMU sensor which is supposed to be installed on board the RAMS is evaluated. And the integration algorithm of GPS/INS are tested with simulated dataset to find out which is more appropriate in real time mapping. According to the static and kinematic results, the sensor shows the position error of 3$\sim$4m and 2$\sim$3m, respectively. Also, it was verified that the sensor performs better on the attitude when the magnetic field sensor are used in the Aerospace mode. In the comparison of EKF and UKF, the overall performances shows not much differences in straight as well as in curved trajectory. However, the calculation time in EKF was appeared about 25 times faster than that of UKF, thus EKF seems to be the better selection in RAMS.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

On Developing The Intellingent contro System of a Robot Manupulator by Fussion of Fuzzy Logic and Neural Network (퍼지논리와 신경망 융합에 의한 로보트매니퓰레이터의 지능형제어 시스템 개발)

  • 김용호;전홍태
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.5 no.1
    • /
    • pp.52-64
    • /
    • 1995
  • Robot manipulator is a highly nonlinear-time varying system. Therefore, a lot of control theory has been applied to the system. Robot manipulator has two types of control; one is path planning, another is path tracking. In this paper, we select the path tracking, and for this purpose, propose the intelligent control¬ler which is combined with fuzzy logic and neural network. The fuzzy logic provides an inference morphorlogy that enables approximate human reasoning to apply to knowledge-based systems, and also provides a mathematical strength to capture the uncertainties associated with human cognitive processes like thinking and reasoning. Based on this fuzzy logic, the fuzzy logic controller(FLC) provides a means of converhng a linguistic control strategy based on expert knowledge into automahc control strategy. But the construction of rule-base for a nonlinear hme-varying system such as robot, becomes much more com¬plicated because of model uncertainty and parameter variations. To cope with these problems, a auto-tuning method of the fuzzy rule-base is required. In this paper, the GA-based Fuzzy-Neural control system combining Fuzzy-Neural control theory with the genetic algorithm(GA), that is known to be very effective in the optimization problem, will be proposed. The effectiveness of the proposed control system will be demonstrated by computer simulations using a two degree of freedom robot manipulator.

  • PDF

Study of Sensor Technology Analysis and Site Application Model for 3D-based Global Modeling of Construction Field (건설 시공현장의 3D기반 광대역 모델링을 위한 Sensor 기술 분석과 향후 현장적용 모델 연구)

  • Kwon, Hyuk-Do;Koh, Min-Hyeok;Yoon, Su-Won;Kwon, Soon-Wook;Chin, Sang-Yoon;Kim, Yea-Sang
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.938-942
    • /
    • 2007
  • The importance of process improvement under construction has arisen from recent issue, lower productivity in the construction site. The various 3D modeling program is utilized in the procedure of construction as an alternative solution. However, it's still shortage of the consideration about a specific technical application. The purpose of the study in this paper is helpful to improve the productivity of construction site using 3D realization of constructing place as one of extensive modeling technologies, which leads to not only efficient management of construction site allowing people to check the real time situation in the place but also the revitalization of information flow about building process control and prgress, Therefore, I research into modeling algorithm and extensive construction site realization technology. 3D realization of building place would reduce the safety concerns by providing the real time information about construction site, and it could help to access easily to similar project through collecting and appling the database of sites. Furthermore it can be an opportunity to develop the procedure of production in construction industry and to upgrade the image of this field.

  • PDF

Improved SIM Algorithm for Contents-based Image Retrieval (내용 기반 이미지 검색을 위한 개선된 SIM 방법)

  • Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.49-59
    • /
    • 2009
  • Contents-based image retrieval methods are in general more objective and effective than text-based image retrieval algorithms since they use color and texture in search and avoid annotating all images for search. SIM(Self-organizing Image browsing Map) is one of contents-based image retrieval algorithms that uses only browsable mapping results obtained by SOM(Self Organizing Map). However, SOM may have an error in selecting the right BMU in learning phase if there are similar nodes with distorted color information due to the intensity of light or objects' movements in the image. Such images may be mapped into other grouping nodes thus the search rate could be decreased by this effect. In this paper, we propose an improved SIM that uses HSV color model in extracting image features with color quantization. In order to avoid unexpected learning error mentioned above, our SOM consists of two layers. In learning phase, SOM layer 1 has the color feature vectors as input. After learning SOM Layer 1, the connection weights of this layer become the input of SOM Layer 2 and re-learning occurs. With this multi-layered SOM learning, we can avoid mapping errors among similar nodes of different color information. In search, we put the query image vector into SOM layer 2 and select nodes of SOM layer 1 that connects with chosen BMU of SOM layer 2. In experiment, we verified that the proposed SIM was better than the original SIM and avoid mapping error effectively.

  • PDF