• Title/Summary/Keyword: Exchange Algorithm

Search Result 498, Processing Time 0.026 seconds

A Study on the Design of Two-Dimensional FIR Digital Filters using Least-Square Error Algorithm (최소자승오차 알고리즘을 이용한 2차원 FIR 디지털필터설계)

  • Ku, Ki-Jun;Cho, Byung-Ha;Lee, Doo-Soo
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.285-289
    • /
    • 1988
  • This paper suggests the way to improve the impulse response characteristics in 1-D and 2-D FIR digital filters design. The proposed a Least Square($L_2$) error algorithm of kaiser window is the better than $L_2$ error of the Remez Exchange(R.E.)algorithm.

  • PDF

Heuristic Algorithm for the Ring-type Network Design Problem (Ring형 Network 설계문제의 휴리스틱 알고리즘)

  • 김길동;이경식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.15 no.25
    • /
    • pp.83-90
    • /
    • 1992
  • This paper aims at the problem that design the network of Rig-star type with the minimum cost, which the Ring is composed of the selected nodes(concentrators) among the several candidate nodes on the network and other nodes(terminals) is connected to the Ring by star subnetwork. Especially, we consider the terminal reliability in network design problem. We develop the heuristic algorithm for network design problem to obtain the near optimal(best) solution for problem. We use an add-heuristic method and 2-exchange method in developing the heuristic algorithm.

  • PDF

Recirculating Shuffle-Exchange Interconnection ATM Switching Network Based on a Priority Control Algorithm (우선순위 제어기법을 기반으로 한 재순환 Shuffle-Exchage 상호연결 ATM 스위치)

  • Park, Byeong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1949-1955
    • /
    • 2000
  • This paper proposes a multistage interconnection ATM switching network without internal blocking. The first is recirculating shuffle-exchange network improved on hardware complexity. The next is connected to Rank network with tree structure. In this network, after the packets transferred to the same output ports are given each priority, only a packet with highest priority is sent to the next, an the others are recirculated to the first. Rearrangeability through decomposition and composition algorithm is applied for the transferred packets in hanyan network and all they arrive at a final destinations. To analyze throughput, waiting time and packet loss ratio according tothe size of buffer, the probabilities are modeled by a binomial distribution of packet arrival.

  • PDF

Performance of SDR-Based Digital-IF Channelization for Dual-Band DS-CDMA System in Wideband Multipath Channel

  • jeon, Jun-Soo
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.4
    • /
    • pp.205-208
    • /
    • 2004
  • In this paper, we analyzed the performance of SDR-based dual-band CDMA system in wideband multipath channel employing RAKE receiver with MRC diversity. For the simulation of SDR-based dual-band CDMA system, we used digital IF techniques, polyphase analysis filter bank as channelizer. Also, Remez exchange algorithm is employed in the realization of the digital filter in the polyphase analysis filter bank. For performance analysis of dual-band CDMA system, we consider power loss of IF signal after passing through channel and the filter. Also, the performance for different sampling rates is analyzed.

A Study of a Secure Channel Implementation on the Military Computer Network (국방망 보안채널 구현에 관한 연구)

  • Lee, Jun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.106-114
    • /
    • 2008
  • In this paper we suggest a protocol and an algorithm which connect a secure channel between a server and a client over a TCP layer. To make key exchange time the most quickly, the protocol adopts ECC Diffie Hellman(ECCDH) algorithm. And the protocol does not use Hello message for key exchanges and state changes. We also implement this protocol over an open TCP/IP program and check the secure channel connecting time over the military computer network. The suggested protocol could be practically used on the military computer network without a hardware implementation.

A Study on Assesment Algorithm for the Economical Generation Capability considering Voltage Stability (전압안정도를 고려한 경제적인 발전가능전력의 산정알고리즘에 관한 연구)

  • Moon, Hyun-Ho;Lee, Jong-Joo;Yoon, Chang-Dae;Ahn, Pius;Choi, Sang-Yule;Shin, Myong-Chul
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.12
    • /
    • pp.536-543
    • /
    • 2006
  • This paper uses Monte Carlo technique, which is one of probabilistic methods of estimating the economical quantity of electric power generation in consideration of voltage stability in the aspect of power generation companies. In the power exchange system in Korea, when power generation companies participate in tenders for power generation capacity at the power exchange, they need to determine their power supply capacity considering the stability of electric power system. Thus, we purposed to propose an algorithm for estimating economical power generation capacity in theaspect of power generation companies, through which we can estimate the margin for voltage stability through P-V curve analysis by capacity according to the change of power generation capacity in a simulated system and to conduct Monte Carlo simulation in consideration of the margin

Optimal Feeder Routing for Distribution System Planning Using a Heuristic Strategy (휴리스틱 탐색전략을 이용한 배전계통 계획의 급전선 최적 경로 선정)

  • Choi, Nam-Jin;Kim, Byung-Seop;Shin, Joong-Rin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.11
    • /
    • pp.566-574
    • /
    • 2000
  • This paper propose a heuristic algorithm based on the Branch-Exchange (BE) method to solve Optimal feeder Routing(OFR) problem for the distribution system planning. The cost function of the OFR problem is consisted of the investment cost representing the feeder installation and the system operation cost representing the system power loss. We propose a properly designed heuristic strategy, which can handle the horizon-year expansion planning problem of power distribution network. We also used the loop selection method which can define the maximum loss reduction in the network to reduce calculation time, and proposed a new index of power loss which is designed to estimate the power loss reduction in the BE. The proposed index, can be considered with both sides, the low voltage side and voltage side branch connected with tie one. The performances of the proposed algorithms and loss index were shown with 32, 69 example bus system.

  • PDF

Numerical study of Flow around Impulsively Started Elliptic Cylinder using Vortex Particle Method (입자와법에 의한 급 출발하는 타원형 실린더 주위 유동해석)

  • Joo, Nam-Soo;Lee, Sang-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1601-1606
    • /
    • 2004
  • In this paper, the unsteady behavior of the viscous flow field past an impulsively started elliptic cylinder is studied numerically. In order to analyze flow field, we introduce vortex particle method. The vorticity transport equation is solved by fractional step algorithm which splits into convection term and diffusion term. The convection term is calculated with Biot-Savart law, the no-through boundary condition is employed on solid boundaries. The diffusion term is modified based on the scheme of particle strength exchange. The particle redistributed scheme for general geometry is adapted. The flows around an elliptic cylinder are investigated for various attack angles at Reynolds number 200. The comparison between numerical results of present study and experimental data shows good agreements.

  • PDF

Invited Speech at ICSS 2007 Generation of Session, Authentication, and Encryption Keys for CDMA2000 1x EV-DO Air Interface Standard

  • Rhee, Man-Young
    • Review of KIISC
    • /
    • v.17 no.2
    • /
    • pp.9-23
    • /
    • 2007
  • The air interface supports a security layer which provides the key exchange protocol, authentication protocol, and encryption protocol. The authentication is performed on the encryption protocol packet. The authentication protocol header or trailer may contain the digital signature that is used to authenticate a portion of the authentication protocol packet that is authenticated. The encryption protocol may add a trailer to hide the actual length of the plaintext of padding to be used by the encryption algorithm. The encryption protocol header may contain variables such as the initialization vector (IV) to be used by the encryption protocol. It is our aim to firstly compute the session key created from the D H key exchange algorithm, and thereof the authenticating key and the encryption key being generated from the session key.

Numerical Study of Flow Around Impulsively Started Elliptic Cylinder Using Vortex Particle Method (입자와법에 의한 급 출발하는 타원형 실린더 주위 유동해석)

  • Lee, Sang-Hwan;Joo, Nam-Soo
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.7
    • /
    • pp.809-817
    • /
    • 2004
  • In this paper, the unsteady behavior of the viscous flow field past an impulsively started elliptic cylinder is studied numerically. In order to analyze flow field, we introduce vortex particle method. The vorticity transport equation is solved by fractional step algorithm which splits into convection term and diffusion term. The convection term is calculated with Biot-Savart law, the no-through boundary condition is employed on solid boundaries. The diffusion term is modified based on the scheme of particle strength exchange. The particle redistributed scheme for general geometry is adapted. The flows around an elliptic cylinder are investigated for various attack angles at Reynolds number 200. The comparison between numerical results of present study and experimental data shows good agreements.