• Title/Summary/Keyword: Hamming network

Search Result 31, Processing Time 0.023 seconds

Neural Hamming MAXNET Design for Binary Pattern Classification (2진 패턴분류를 위한 신경망 해밍 MAXNET설계)

  • 김대순;김환용
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.12
    • /
    • pp.100-107
    • /
    • 1994
  • This article describes the hardware design scheme of Hamming MAXNET algorithm which is appropriate for binary pattern classification with minimum HD measurement between stimulus vector and storage vector. Circuit integration is profitable to Hamming MAXNET because the structure of hamming network have a few connection nodes over the similar neuro-algorithms. Designed hardware is the two-layered structure composed of hamming network and MAXNET which enable the characteristics of low power consumption and fast operation with biline volgate sensing scheme. Proposed Hamming MAXNET hardware was designed as quantize-level converter for simulation, resulting in the expected binary pattern convergence property.

  • PDF

Design of modified HN for High Data Transmission (고속 데이터 전송을 위한 변형 해밍망 설계)

  • Kwon, Yong-Kwang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.251-257
    • /
    • 2014
  • The Viterbi algorithm(VA) is used to estimate the state transition of discrete-time finite state machine(FSM) that is in an uncorrelated noisy environment. This paper modified the Hamming Network to estimate the state transitions in the finite state machines, and proposed state-parallel and block-parallel Viterbi decoder. The modified Hamming Network(mHN) can perform the decoding of convolutional codes correctly as conventional Viterbi decoder. Furthermore, the complexities of the proposed Viterbi decoder are reduced approximately 10% less than conventional Viterbi decoder, and the processing times are improved approximately 40% more than conventional Viterbi decoder.

Discharging/Charging Voltage-Temperature Pattern Recognition for Improved SOC/Capacity Estimation and SOH Prediction at Various Temperatures

  • Kim, Jong-Hoon;Lee, Seong-Jun;Cho, Bo-Hyung
    • Journal of Power Electronics
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • This study investigates an application of the Hamming network-dual extended Kalman filter (DEKF) based on pattern recognition for high accuracy state-of-charge (SOC)/capacity estimation and state-of-health (SOH) prediction at various temperatures. The averaged nine discharging/charging voltage-temperature (DCVT) patterns for ten fresh Li-Ion cells at experimental temperatures are measured as representative patterns, together with cell model parameters. Through statistical analysis, the Hamming network is applied to identify the representative pattern that matches most closely with the pattern of an arbitrary cell measured at any temperature. Based on temperature-checking process, model parameters for a representative DCVT pattern can then be applied to estimate SOC/capacity and to predict SOH of an arbitrary cell using the DEKF. This avoids the need for repeated parameter measuremet.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

Machine Cell Formation using A Classification Neural Network

  • Lee, Kyung-Mi;Lee, Keon-Myung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.1
    • /
    • pp.84-89
    • /
    • 2004
  • The machine cell formation problem is the problem to group machines into machine families and parts into part families so as to minimize bottleneck machines, exceptional parts, and inter-cell part movements in cellular manufacturing systems and flexible manufacturing systems. This paper proposes a new machine cell formation method based on the adaptive Hamming net which is a kind of neural network model. To show the applicability of the proposed method, it presents some experiment results and compares the method with other cell formation methods. From the experiments, we observed that the proposed method could produce good cells for the machine cell formation problem.

Automobile diagnosis by euro-Fuzzy Technique (뉴로-퍼지 기법에 의한 자동차 진단)

  • Shin, Joon;Oh, Jae-Eung
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.16 no.10
    • /
    • pp.1833-1840
    • /
    • 1992
  • In the diagnostic process for automobile, Neuro-Fuzzy technique was compared with the conventional diagnostic method for the verification of performance, and proto-type system was developed. For the utilities of the system, 1/3 octave filter(band-pass filter) and A/D converter were used for data acquisition and then data were analyzed using octave band processing and pattern recognition using hamming network algorithm. In order to raise the reliability of the diagnostic results by considering many operating variables and condition of automobile to be diagnosed, fuzzy inference technique was applied in combining several information. The validation of this diagnostic system was examined through computer simulation and experiment, and it showed an acceptable performance for diagnostic process.

Performance Analysis of CRC Error Detecting Codes (CRC 오류검출부호의 성능 분석)

  • 염흥렬;권주한;양승두;이만영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.6
    • /
    • pp.590-603
    • /
    • 1989
  • In tnis paper, the CRC-CCITT code and primitive polynomial CRC code are selected for analysing error detecting performance. However, general formulas for obtaining the weight distribution of these two CRC codes are not so far dericed. So, a new method for calculating the weight distribution of the shortened cyclic Hamming code is presented and an undetected error probability of these two codes is obtained when used in cell of ATM for broadband ISDN user-network interface. Consequently, we show that CRC code too much does affect its error detection performance. All the computer simulation is performed by IBM PC/AT.

  • PDF

Machine-printed Numeral Recognition using Weighted Template Matching (가중 원형 정합을 이용한 인쇄체 숫자 인식)

  • Jung, Min-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.554-559
    • /
    • 2009
  • This paper proposes a new method of weighted template matching fur machine-printed numeral recognition. The proposed weighted template matching, which emphasizes the feature of a pattern using adaptive Hamming distance on local feature areas, improves the recognition rate while template matching processes an input image as one global feature. The experiment compares confusion matrices of the template matching, error back propagation neural network classifier, and the proposed weighted template matching respectively. The result shows that the proposed method improves fairly the recognition rate of the machine-printed numerals.

Improved Anti-Jamming Frame Error Rate and Hamming Code Repetitive Transmission Techniques for Enhanced SATURN Network Reliability Supporting UAV Operations (UAV 운영 신뢰성 개선을 위한 SATURN 통신망 항재밍 프레임 오율과 해밍코드 반복 전송 향상 기술)

  • Hwang, Yoonha;Baik, Jungsuk;Gu, Gyoan;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • As the performance of Unmanned Aerial Vehicles (UAVs) are improving and the prices are lowering, it is expected that the use of UAVs will continuously grow in the future. It is important to always maintain control signal and video communication to operate remote UAVs stably, especially in military UAV operations, as unexpected jamming attacks can result in fatal UAV crashes. In this paper, to improve the network reliability and low latency when supporting UAV operations, the anti-jamming performance of Second generation Anti-jam Tactical UHF Radio for NATO (SATURN) networks is analyzed and enhanced by applying Forward Error Correction (FEC) and Minimum Shift Keying (MSK) modulation as well as Hamming code based multiple transmission techniques.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur Jung-Youn;Truong Le Xuan;Lee Sang-Kyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.357-362
    • /
    • 2005
  • Iris recognition system is the one of the most reliable biometries recognition system. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transformed into polar coordinates. After performing three times Wavelet transformation, normalization was done using a sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compared pairs of two adjacent pixels. The binary code of the iris is transmitted to the server by the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the database. The process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.