• Title/Summary/Keyword: Implementation Techniques

Search Result 1,389, Processing Time 0.025 seconds

Design and Implementation of Engine to Control Characters By Using Machine Learning Techniques (기계학습 기법을 사용한 캐릭터 제어 엔진의 설계 및 구현)

  • Lee, Jae-Moon
    • Journal of Korea Game Society
    • /
    • v.6 no.4
    • /
    • pp.79-87
    • /
    • 2006
  • This paper proposes the design and implementation of engine to control characters by using machine teaming techniques. Because the proposed engine uses the context data in the rum time as the knowledge data, there is a merit which the player can not easily recognize the behavior pattern of the intelligent character. To do this, the paper proposes to develop the module which gathers and trains the context data and the module which tests to decide the optimal context control for the given context data. The developed engine is ported to FEAR and run with Quake2 and experimented far the correctness of the development and its efficiency. The experiments show that the developed engine is operated well and efficiently within the limited time.

  • PDF

A Novel Analytical Method for Selective Harmonic Elimination Problem in Five-Level Converters

  • Golshan, Farzad;Abrishamifar, Adib;Arasteh, Mohammad
    • Journal of Power Electronics
    • /
    • v.17 no.4
    • /
    • pp.914-922
    • /
    • 2017
  • Multilevel converters have attracted a lot of attention in recent years. The efficiency parameters of a multilevel converter such as the switching losses and total harmonic distortion (THD) mainly depend on the modulation strategy used to control the converter. Among all of the modulation techniques, the selective harmonic elimination (SHE) method is particularly suitable for high-power applications due to its low switching frequency and high quality output voltage. This paper proposes a new expression for the SHE problem in five-level converters. Based on this new expression, a simple analytical method is introduced to determine the feasible modulation index intervals and to calculate the exact value of the switching angles. For each selected harmonic, this method presents three-level or five-level waveforms according to the value of the modulation index. Furthermore, a flowchart is proposed for the real-time implementation of this analytical method, which can be performed by a simple processor and without the need of any lookup table. The performance of the proposed algorithm is evaluated with several simulation and experimental results for a single phase five-level diode-clamped inverter.

A Component Transformation Technique based on Model for Composition of EJB and COM+ (EJB와 COM+ 결합을 위한 모델기반 컴포넌트 변환 기법)

  • 최일우;신정은;류성열
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1172-1184
    • /
    • 2003
  • At present, new techniques based on different component reference models for the integration of component and system of different platforms, such as EJB and COM+, are introduced. The operation between the components in the identical component platform is realized by the composition at the source level. In case of the different component platform, however, it is impossible to use combined components in real condition although they are components of similar domain. In this paper we proposed a solution for the composition problem by using component transformation methodology based on model between EJB and COM+ components which are different components. For the composition between EJB and COM+ components, we compared and analyzed each reference model, then proposed the Virtual Component Model which is implementation independent and the Implementation Table for the mutual conversion. Reffering to the Virtual Component Model and the Implementation Table, we can generalize each Implementation model to the Virtual Component Model, make the Virtual Component Model which is implementation independent through the virtual component modeling, transform EJB and COM+ components selectively. Proposing the effective Model Transformation method to the different component platform, we can combine EJB and COM+ components.

Low Area Design and Implementation for IEEE 802.11a OFDM Timing Synchronization Block (IEEE 802.11a OFDM 타이밍 동기화기 블록의 저면적 설계 및 구현)

  • Seok, Sang-Chul;Jang, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.2
    • /
    • pp.31-38
    • /
    • 2012
  • In this paper, a low area timing synchronization structure for the IEEE 802.11a OFDM MODEM SoC is proposed. The timing synchronization block of the IEEE 802.11a OFDM MODEM SoC requires large implementation area. In the proposed timing synchronization structure, it is shown that the number of multiplication can be reduced by using the transposed direct form filter. Furthermore, implementation area of the proposed structure can be more reduced using CSD(Canonic Signed Digit) and Common Sub-expression Sharing techniques. Through Verilog-HDL coding and synthesis, it is shown that the 22.7 % of implementation area can be reduced compared with the conventional one.

Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison

  • Benhadjyoussef, Noura;Karmani, Mouna;Machhout, Mohsen
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.264-271
    • /
    • 2021
  • From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its physical (hardware or software) implementation opens the door to various real-world security threats. In the modern age of electronics, cryptanalysis attempts to reveal secret information based on cryptosystem physical properties, rather than exploiting the theoretical weaknesses in the implemented cryptographic algorithm. The correlation power attack (CPA) is a Side-Channel Analysis attack used to reveal sensitive information based on the power leakages of a device. In this paper, we present a power Hacking technique to demonstrate how a power analysis can be exploited to reveal the secret information in AES crypto-core. In the proposed case study, we explain the main techniques that can break the security of the considered crypto-core by using CPA attack. Using two cryptographic devices, FPGA and 8051 microcontrollers, the experimental attack procedure shows that the AES hardware implementation has better resistance against power attack compared to the software one. On the other hand, we remark that the efficiency of CPA attack depends statistically on the implementation and the power model used for the power prediction.

Status and Future of Security Techniques in the Internet Banking Service (인터넷 뱅킹 서비스 보안기술의 현황과 미래)

  • Lee, Kyungroul;Yim, Kangbin;Seo, Jungtaek
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.31-42
    • /
    • 2017
  • As Internet banking service became popular, many users can exchange goods by online. Even though this advantage, there are incident cases in the Internet banking service due to security threats. In order to counteract this problem, various security techniques have been applied over whole area in the Internet banking service. Therefore, we described that analyzed results of security techniques applied in the financial institutions area and network communication area in this paper. We consider that this paper will be useful as a reference to protect security threats occurred by insiders and vulnerabilities in implementation.

Novel Two-Phase RPWM Technique for Three-Phase Induction Motor Drive (3상 유도전동기 구동을 위한 새로운 2상 RPWM기법)

  • Lee Hyo-Sang;Kim Nam-Joon
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.9 no.5
    • /
    • pp.430-437
    • /
    • 2004
  • This thesis proposes novel SRP-PWM(Separately Random Pulse Position PWM) techniques and novel two-phase switching pattern applied to four-switch inverter, having various advantages such as operation time decrease that is required for decrease of switching damage, easy of implementation and inverter control at high frequency switching. In this thesis, we wish to confirm that SRP-PWM techniques disperse harmonic spectrum of inverter output current evenly into wide frequency area, that is, side-band of specification frequency. And we confirm the harmonic reduction effect of proposed techniques. Therefore, we will achieve an experiment by IGBT inverter using DSP and will verify the validity of proposed techniques compared with simulation results that use MATLAB/SIMULINK.

Implementation of a Switched PV Technique for Rooftop 2 kW Solar PV to Enhance Power during Unavoidable Partial Shading Conditions

  • Kumar, B. Praveen;Winston, D. Prince;Christabel, S. Cynthia;Venkatanarayanan, S.
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1600-1610
    • /
    • 2017
  • We propose maximum power extraction from a rooftop solar photovoltaic (PV) array during partial shading conditions. Partial shading is unavoidable during power extraction from rooftop PV systems due to nearby tall buildings (construction of additional floors) and trees (growth of trees). Many reconfiguration techniques can be used to extract maximum power in partial shading conditions, but in several cases, the real maximum power output is not achieved. In this study, a new switched PV technique is proposed to enhance the power output. The proposed technique is simple to use and more cost effective than other reconfiguration techniques. Therefore, it is suitable for rooftop applications. The power output of the proposed technique is compared with that of existing techniques with similar shading patterns. Eight panels with ratings of 250 watts (2 kW) each are used for testing. MATLAB simulation and hardware verification are done for the proposed and existing techniques. The proposed technique is implemented on a $4{\times}2$ PV array, although it can be extended to a number of arrays.

Design and Implementation of Marketing and Sales Information System for Automotive Part Company Using Object-Oriented Methodology (객체지향 방법론을 이용한 자동차부품기업의 영업관리시스템 설계 및 구현)

  • Kang Sung-bae;Moon Tae-Soo
    • The Journal of Information Systems
    • /
    • v.13 no.1
    • /
    • pp.77-95
    • /
    • 2004
  • According to the increase of organizational complexity and the change of rapid information technology environment, many firms have shifted their information technology(IT) strategy from developing information systems in-house to purchasing application software such as Enterprise Resource Planning(ERP) Systems. Marketing and Sales functions within a Korean automotive part company include developing new assembly products, determining pricing, taking customer's orders, and shipping assembly products to customers. Marketing and Sales Information System(MSIS) in ERP system plays an important role in next Production Planning process. MSIS also makes management reporting and decision making faster and more uniform throughout an organization. MSIS promotes thinking about corporate goals, as opposed to thinking only about the goals of a single department or functional area. This paper intends to design and implement a MSIS in ERP systems for Korean automotive part company using object-oriented methodology In order to accomplish the implementation of MSIS in ERP system, we employed UML as its standard modeling language. In this study, four diagramming techniques such as use case diagram, sequence diagram, class diagram, component diagram among eight modeling techniques are used for analyzing hierarchical business process. In traditional marketing and sales function, a company with an unintegrated information system can have marketing and sales data that is data redundant or inaccurate. MSIS integrated in ERP system can solve the sales forecast problem, which minimizes the total costs of production, inventory, and transportation under constraints of production capacity. Also, the use of UML methodology makes S/W programmers shorten the phase of analysis and design in the implementation of MSIS system, and increase the reuse of software and the interoperability with corporate internal Information system.

  • PDF

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.