• Title/Summary/Keyword: Efficiency of operations

Search Result 1,344, Processing Time 0.03 seconds

Design of Low-complexity FFT Processor for Multi-mode Radar Signal Processing (멀티모드 레이다 신호처리를 위한 저복잡도 FFT 프로세서 설계)

  • Park, Yerim;Jung, Yongchul;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.85-91
    • /
    • 2020
  • Recently, a multi-mode radar system was designed for efficient operation of unmanned aerial vehicles (UAVs) in various environments, which has the advantage of being able to integrate and utilize methods of the pulse Doppler (PD) radar and the frequency modulated continuous wave (FMCW) radar. For the range detection part of the multi-mode radar signal processor (RSP), the hardware structure using the FFT processor and the IFFT processor is required to be designed in a way that improves efficiency on the area side. In addition, given the radar application environment that requires a variety of distance resolutions, FFT processors need to support variable-length operations. In this paper, the FFT processor and IFFT processor in multi-mode RSP range estimation are designed and proposed as hardware for a single FFT processor that supports variable length operation of 16-1024 points. The proposed FFT processor designed in hardware description language (HDL) and can be implemented with 7,452 logic elements and 5,116 registers.

A Rewriting Algorithm for Inferrable SPARQL Query Processing Independent of Ontology Inference Models (온톨로지 추론 모델에 독립적인 SPARQL 추론 질의 처리를 위한 재작성 알고리즘)

  • Jeong, Dong-Won;Jing, Yixin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.505-517
    • /
    • 2008
  • This paper proposes a rewriting algorithm of OWL-DL ontology query in SPARQL. Currently, to obtain inference results of given SPARQL queries, Web ontology repositories construct inference ontology models and match the SPARQL queries with the models. However, an inference model requires much larger space than its original base model, and reusability of the model is not available for other inferrable SPARQL queries. Therefore, the aforementioned approach is not suitable for large scale SPARQL query processing. To resolve tills issue, this paper proposes a novel SPARQL query rewriting algorithm that can obtain results by rewriting SPARQL queries and accomplishing query operations against the base ontology model. To achieve this goal, we first define OWL-DL inference rules and apply them on rewriting graph pattern in queries. The paper categorizes the inference rules and discusses on how these rules affect the query rewriting. To show the advantages of our proposal, a prototype system based on lena is implemented. For comparative evaluation, we conduct an experiment with a set of test queries and compare of our proposal with the previous approach. The evaluation result showed the proposed algorithm supports an improved performance in efficiency of the inferrable SPARQL query processing without loss of completeness and soundness.

Geophysical and Geological Exploration of Cobalt-rich Ferromanganese Crusts on a Seamount in the Western Pacific (서태평양 해저산 고코발트 망간각 자원평가를 위한 광역 탐사 방안)

  • Kim, Jonguk;Ko, Young-Tak;Hyeong, Kiseong;Moon, Jai-Woon
    • Economic and Environmental Geology
    • /
    • v.46 no.6
    • /
    • pp.569-580
    • /
    • 2013
  • Co-rich ferromanganese crusts (Fe-Mn crusts) distributed on the seamounts in the western Pacific are potential economic resources for cobalt, nickel, platinum, and other rare metals in the future. Regulations for prospecting and exploration of Fe-Mn crusts in the Area, which enables the process to obtain an exclusive exploration right for blocks of the fixed size, were enacted recently by the International Seabed Authority, which led to public attention on its potential for commercial development. Evaluation and selection of a mining site can be established based on abundance and grade of Fe-Mn crusts in the site as well as topography that should be smooth enough for mining efficiency. Therefore, acquisition of shipboard echo-sounding and acoustic backscatter data are prerequisite to select potential mine sites in addition to visual and sampling operations. Acoustic backscatter data can be used to locate crust-covered areas in a regional scale with the understanding of acoustic properties of crust through its correlation with visual and sampling data. KIOST had collected the topographic and geologic data to assess the resources potential for Fe-Mn crusts in the west Pacific region from 1994 to 2001. However, they could not obtain acoustic backscatter data that is crucial for the selection of prospective mining sites. Therefore, additional exploration surveys are required to carry out side scan sonar mapping combined with seafloor observation and sampling to decide the blocks for application of an exclusive exploration right.

Modified SMPO for Type-II Optimal Normal Basis (Type-II 최적 정규기저에서 변형된 SMPO)

  • Yang Dong-Jin;Chang Nam-Su;Ji Sung-Yeon;Kim Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.105-111
    • /
    • 2006
  • Cryptographic application and coding theory require operations in finite field $GF(2^m)$. In such a field, the area and time complexity of implementation estimate by memory and time delay. Therefore, the effort for constructing an efficient multiplier in finite field have been proceeded. Massey-Omura proposed a multiplier that uses normal bases to represent elements $CH(2^m)$ [11] and Agnew at al. suggested a sequential multiplier that is a modification of Massey-Omura's structure for reducing the path delay. Recently, Rayhani-Masoleh and Hasan and S.Kwon at al. suggested a area efficient multipliers for modifying Agnew's structure respectively[2,3]. In [2] Rayhani-Masoleh and Hasan proposed a modified multiplier that has slightly increased a critical path delay from Agnew at al's structure. But, In [3] S.Kwon at al. proposed a modified multiplier that has no loss of a time efficiency from Agnew's structure. In this paper we will propose a multiplier by modifying Rayhani-Masoleh and Hassan's structure and the area-time complexity of the proposed multiplier is exactly same as that of S.Kwon at al's structure for type-II optimal normal basis.

Implementation of a walking-aid light with machine vision-based pedestrian signal detection (머신비전 기반 보행신호등 검출 기능을 갖는 보행등 구현)

  • Jihun Koo;Juseong Lee;Hongrae Cho;Ho-Myoung An
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.31-37
    • /
    • 2024
  • In this study, we propose a machine vision-based pedestrian signal detection algorithm that operates efficiently even in computing resource-constrained environments. This algorithm demonstrates high efficiency within limited resources and is designed to minimize the impact of ambient lighting by sequentially applying HSV color space-based image processing, binarization, morphological operations, labeling, and other steps to address issues such as light glare. Particularly, this algorithm is structured in a relatively simple form to ensure smooth operation within embedded system environments, considering the limitations of computing resources. Consequently, it possesses a structure that operates reliably even in environments with low computing resources. Moreover, the proposed pedestrian signal system not only includes pedestrian signal detection capabilities but also incorporates IoT functionality, allowing wireless integration with a web server. This integration enables users to conveniently monitor and control the status of the signal system through the web server. Additionally, successful implementation has been achieved for effectively controlling 50W LED pedestrian signals. This proposed system aims to provide a rapid and efficient pedestrian signal detection and control system within resource-constrained environments, contemplating its potential applicability in real-world road scenarios. Anticipated contributions include fostering the establishment of safer and more intelligent traffic systems.

Design of a Web-based Java Applet for Conceptual Learning in Digital Logic Circuits and its Student Satisfaction Survey (디지털 논리회로의 개념학습을 위한 웹기반 교육용 자바 애플릿의 설계와 만족도 조사)

  • Kim, Dong-Sik;Choi, Kwan-Sun;Lee, Sun-Heum;Chung, Hye-Kyung
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.61-70
    • /
    • 2015
  • This paper presents a web-based Java applet for understanding the concepts in digital logic circuits and student satisfaction survey was carried out in order to show its educational validity. Through our educational Java applet, the learners will be capable of learning the concepts and principles related to digital logic circuit experiments and how to operate virtual experimental equipments and virtual bread board. The proposed educational Java applet is composed of five important components: Principle Classroom to explain the concepts and principles for digital logic circuit operations, Simulation Classroom to provide a web-based simulator to the learners, Virtual Experiment Classroom to provide interactive Java applet about the syllabus of off-line laboratory class, Assessment Classroom, and Management System. With the aid of the Management System every classroom is organically tied together collaborating to achieve maximum learning efficiency. Finally, we have obtained several affirmative effects such as high learning standard, reducing the total experimental hours and the damage rate for experimental equipments.

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

Performance of an Efficient Association Control Scheme for Public Wireless LAN Systems (고속 공중 무선랜 시스템을 위한 효율적인 연결 요청 제어방법의 성능분석)

  • Lee Hyun woo;Kim Se han;Ryu Won;Yoon Chong ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.209-216
    • /
    • 2005
  • This paper generally relates to the field of wireless local area networks(WLANs), and more particularly, to AP selection and association methods for the performance of a station. In these days, IEEE 802.11 Wireless LAN network is widely deployed and used as an emerging service to connect high-speed Internet in the public wireless environment. But, if there are many users in hot spot area, they suffer a severe decrease of performance. Thus it needs an association and access control mechanism especially when it is used in the public environment. In this paper, we suggest a selection and association method using Beacon or Probe Response frames based IEEE 802.11. Station selects AP using the information of the capacity area in a Beacon or a Probe Response frame. According to the present paper, an association method for a public WLAN service, which includes a WLAN user terminal and an AP for relaying WLAN communications to and from the user terminal, includes the steps of the user terminal asking the AP's states for access to a radio channel; and the station selects and associates with the AP According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.

A Study on the Korean Current Status and Strategy Directions of International Logistical Transport Route: With the Case of Trans Korean Peninsula Railway (한국 국제물류운송루트의 실태와 전략 방향 - 한반도 대륙횡단철도를 중심으로 -)

  • Kim, Hong-seop
    • Journal of Distribution Science
    • /
    • v.4 no.1
    • /
    • pp.53-78
    • /
    • 2006
  • We call this world network society. Logistics is one of important network systems which connect people, materials and information. The World Economy Conditions of 21st Century has been Changed so rapidly. These Changes are more conspicuous in Northeast Asia than other Regions. China, North Korea and Russia have reformed their Economical and Social Systems, which enlarged the Trade Volume and Traffic Demand in this Area and between Europe. The Railway System Crossing the Eurasia Continent, such as TSR(Trans Siberian Railway), TCR(Trans China Railway), TMR(Trans Manchuria Railway), TMGR(Trans Mongolia Railway) and TKR(Trans Korea Railway), have been becoming very important to enhance the International Transportation efficiency and to connect each continents by International Railways. This Paper investigated and surveyed the logistical Environments surrounding this Korea Peninsula. And concerned with the Crossing Continents Railway, TSR,TCR(TMR, TMGR), TKR, operating Conditions and Tasks that must be considered and solved were also investigated. Especially the Current Logistical Conditions of China, Russia, and North Korea and their Problems were surveyed. And the SWOT of these Railways were analyzed and compared. The Visions and Goals of these Inter-Continental Railways were suggested in terms of their Rationalization of Operations and efficient Connections among many Countries. Not only the Policies and Strategies/Tactics which should be considered but also and Many detail countermeasures which should be introduced and adopted were suggested.

  • PDF

An Adaptive Temporal Suppression for Reducing Network Traffic in Wireless Sensor Networks (무선 센서 네트워크에서 통신량 감소를 위한 적응적 데이터 제한 기법)

  • Min, Joonki;Kwon, Youngmi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.60-68
    • /
    • 2012
  • Current wireless sensor networks are considered to support more complex operations ranging from military to health care which require energy-efficient and timely transmission of large amounts of data. In this paper, we propose an adaptive temporal suppression algorithm which exploits a temporal correlation among sensor readings. The proposed scheme can significantly reduce the number of transmitted sensor readings by sensor node, and consequently decrease the energy consumption and delay. Instead of transmitting all sensor readings from sensor node to sink node, the proposed scheme is to selectively transmit some elements of sensor readings using the adaptive temporal suppression, and the sink node is able to reconstruct the original data without deteriorating data quality by linear interpolation. In our proposed scheme, sensing data stream at sensor node is divided into many small sensing windows and the transmission ratio in each window is decided by the window complexity. It is defined as the number of a fluctuation point which has greater absolute gradient than threshold value. We have been able to achieve up about 90% communication reduction while maintaining a minimal distortion ratio 6.5% in 3 samples among 4 ones.