• Title/Summary/Keyword: Information Delay

Search Result 5,532, Processing Time 0.032 seconds

Automatic On-Chip Glitch-Free Backup Clock Changing Method for MCU Clock Failure Protection in Unsafe I/O Pin Noisy Environment (안전하지 않은 I/O핀 노이즈 환경에서 MCU 클럭 보호를 위한 자동 온칩 글리치 프리 백업 클럭 변환 기법)

  • An, Joonghyun;Youn, Jiae;Cho, Jeonghun;Park, Daejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.99-108
    • /
    • 2015
  • The embedded microcontroller which is operated by the logic gates synchronized on the clock pulse, is gradually used as main controller of mission-critical systems. Severe electrical situations such as high voltage/frequency surge may cause malfunctioning of the clock source. The tolerant system operation is required against the various external electric noise and means the robust design technique is becoming more important issue in system clock failure problems. In this paper, we propose on-chip backup clock change architecture for the automatic clock failure detection. For the this, we adopt the edge detector, noise canceller logic and glitch-free clock changer circuit. The implemented edge detector unit detects the abnormal low-frequency of the clock source and the delay chain circuit of the clock pulse by the noise canceller can cancel out the glitch clock. The externally invalid clock source by detecting the emergency status will be switched to back-up clock source by glitch-free clock changer circuit. The proposed circuits are evaluated by Verilog simulation and the fabricated IC is validated by using test equipment electrical field radiation noise

Robust and Non-fragile H Controller Design Algorithm for Time-delayed System with Randomly Occurring Uncertainties and Disturbances ) (임의발생 불확실성 및 외란을 고려한 시간지연시스템의 강인비약성 H 제어기 설계 알고리듬)

  • Yang, Seung Hyeop;Paik, Seung Hyun;Lee, Jun Yeong;Park, Hong Bae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.89-98
    • /
    • 2015
  • This paper provides a robust and non-fragile $H_{\infty}$ controller design algorithm for time-delayed systems with randomly occurring polytopic uncertainties and disturbances. First, we design time-delayed system considering randomly occurring uncertainties and disturbances. Next, The sufficient condition for the existence of robust and non-fragile $H_{\infty}$ controller is presented by LMI(linear matrix inequality) using Lyapunov stability analysis and $H_{\infty}$ performance measure. Since the obtained condition can be expressed as a PLMI(parameterized linear matrix inequality) by changes of variables and Schur complement, all solutions including controller gain, degrees of controller satisfying non-fragility, $H_{\infty}$ norm bound ${\gamma}$ can be calculated simultaneously. Finally, numerical examples are given to illustrate the performance and the effectiveness of the proposed robust and non-fragile $H_{\infty}$ controller compared with the deterministic uncertainty model even though there exists randomly occurring uncertainties, disturbances and time delays.

Performance Analysis on The Reactive Repeater Jamming Techniques Against an RCIED Using Mobile Devices (모바일 단말을 이용한 RCIED에 대한 repeater 방식의 반응 재밍 기법 성능 분석)

  • Kim, Yo-Han;Kim, Dong-Gyu;Kim, Hyoung-Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.55-63
    • /
    • 2015
  • Recently, terroristic threats using a radio controlled improvised explosive device (RCIED) that is remotely controlled and exploded have been increased around the world. In order to prevent the explosion of an RCIED, jamming techniques that interrupt an RCIED receiver can be used, so that the receiver can not demodulate the trigger code. Conventional jamming technique is a type of active barrage jamming that always emits the noise jamming signal for all the frequency band. However, it needs large power consumption and thus is limited in operation time for a vehicle. In order to overcome the shortage of the active barrage jamming, reactive jamming technique has drawn attention. In reactive jamming, all the frequency band is firstly scanned, and then if any trigger signal exists, one emits the jamming signal to the corresponding frequency band. Therefore, the reactive jamming is superior to the active barrage jamming in terms of power efficiency. However, a reactive jammer emits a jamming signal only after the trigger signal is intercepted, which means that the jamming signal may be late for interrupting an RCIED receiver. In this sense, it is needed to evaluate a delay in an RCIED receiver. To achieve this, we analyze the reaction time and present the simulation result for jamming performance of reactive jamming against an RCIED using mobile devices.

The Effect of Cloud Service Risks on the Intention of Purchasing Real Options: Focusing on Public Cloud Service of Small and Medium-sized Enterprises (클라우드 서비스 위험이 실물옵션 채택의도에 미치는 영향: 중소기업의 퍼블릭 클라우드 서비스를 중심으로)

  • Kim, Jeong-eun;Yang, Hee-dong
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.117-140
    • /
    • 2015
  • Cloud Computing has drawn attention as one of 10 IT strategic technology trends and has various advantages such as cost reduction and enhancing business flexibility. However, corporations hesitate to adopt the service because of unexpected risks. Especially compared to large firm, medium and small ones use public cloud that security risk is high. Meanwhile, real option strategy has drawn attention as the method to hedge uncertainty in IT projects. Therefore, in this study causal relationships among technical, security, relational, and economic risks of cloud service will be investigated. Eventually, this study investigates how those risks influence the intention to choose the real option about the cloud service. For this study, five hypotheses is drawn, and a survey is conducted about the medium and small firms which are currently using cloud service to examine hypotheses. Since the study is at organizational level, 287 questionnaire replies are recalculated to 120 firms. For statistical analysis, Smart PLS and SPSS Statistics18 are used. As a result, technical risk of cloud service has significantly positive influence on security risk. Second, security risk and relational risk of cloud service has significantly positive influence on economic risk. Third, economic risk of cloud service has significantly positive influence on the intention to purchase the delay option or abandon option. Based on this result, this research discussed practical and academic implications and the limitations.

Implementation of an operation module for an integrated network management system of ship-based and offshore plants (해양플랜트 및 선박의 네트워크 통합 관리 시스템 운용 모듈 개발)

  • Kang, Nam-Seon;Lee, Seon-Ho;Lee, Beom-Seok;Kim, Yong-Dae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.613-621
    • /
    • 2016
  • This research connected network equipment, including CCTV, PAGA, IP-PBX, and Legacy, in order to enable the operation and configuration of internal IP-based network equipment in maritime plants and vessels, both in the field and from remote places, and to allow for the support of remotely controlling such equipment. It also realized an operating program for the integrated network equipment management system to enable the monitoring and control of equipment status, operation condition, and notifications from distant places. By applying the operating program to satellite stations and vessels sailing on the sea, a performance test was conducted to evaluate data loss and transmission/reception delay in the communication section between the land and vessels. As a result, this research verified the normal operation of CCTV control and of real-time monitoring and control of the network equipment, including PAGA, IP-PBX, and Legacy under the FBB and MVSAT environments. It was observed that the transmission of CCTV video images with a large volume of data as well as the transmission and reception of voice data were found to be slightly delayed, indicating the need to develop technology to compress and convert data for real-time transmission and reception.

Discovery of Active Nodes and Reliable Transmission of Active Packets in IP Networks (IP 망에서의 액티브 노드 발견 및 액티브 패킷의 신뢰성 전송 기법)

  • Kim, Bang-Eun;Chae, Ki-Joon;Kim, Dong-Young;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.361-370
    • /
    • 2004
  • All active nudes which have no physically direct connection with each other in If network must be able to compose and manage network topology Informations. Besides one active program can be performed by the active nodes when every active packet for this program is transmitted without any loss of packets. Also the active packets should be transmitted effectively to minimize the transmission delay and securely from threatens. In this thesis, the discovery scheme of active nodes is adapted for active nodes in IP networks to compose and manage the topology information. The scheme for the efficient, reliable and secure transmission of active packets is also proposed. The sequence number is assigned to every active packet. If a receiver detects the loss of active packet checking the sequence number, the receiver requests the retransmission of the lost packet to the previous active node. kiter receiving an active packet and adapting security and reliability schemes, intermediate active nodes not only copy and send the Packet Instantly but also apply some suity mechanisms to it. And the active packet transmission engine is proposed to provide these transmission schemes The simulation of the adapted active node discovery scheme and the proposed active packet transmission engine is performed. The simulation results show that the adapted active node discovery scheme is efficient and the proposed active engine has the low latency and the high performance.

An Adaptive Decision-Feedback Equalizer Architecture using RB Complex-Number Filter and chip-set design (RB 복소수 필터를 이용한 적응 결정귀환 등화기 구조 및 칩셋 설계)

  • Kim, Ho Ha;An, Byeong Gyu;Sin, Gyeong Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.2015-2024
    • /
    • 1999
  • Presented in this paper are a new complex-umber filter architecture, which is suitable for an efficient implementation of baseband signal processing of digital communication systems, and a chip-set design of adaptive decision-feedback equalizer (ADFE) employing the proposed structure. The basic concept behind the approach proposed in this paper is to apply redundant binary (RB) arithmetic instead of conventional 2’s complement arithmetic in order to achieve an efficient realization of complex-number multiplication and accumulation. With the proposed way, an N-tap complex-number filter can be realized using 2N RB multipliers and 2N-2 RB adders, and each filter tap has its critical delay of $T_{m.RB}+T_{a.RB}$ (where $T_{m.RB}, T_{a.RB}$are delays of a RB multiplier and a RB adder, respectively), making the filter structure simple, as well as resulting in enhanced speed by means of reduced arithmetic operations. To demonstrate the proposed idea, a prototype ADFE chip-set, FFEM (Feed-Forward Equalizer Module) and DFEM (Decision-Feedback Equalizer Module) that can be cascaded to implement longer filter taps, has been designed. Each module is composed of two complex-number filter taps with their LMS coefficient update circuits, and contains about 26,000 gates. The chip-set was modeled and verified using COSSAP and VHDL, and synthesized using 0.8- μm SOG (Sea-Of-Gate) cell library.

  • PDF

Unfairness of Congestion Control for Point-to-Multipoint Connections on ATM (ATM 상의 다중점 연결을 위한 폭주 제어 기법의 불공정성)

  • Choi, Won-Jeong;Lee, Mee-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1311-1319
    • /
    • 1998
  • The methods of providing available bandwidth adaptively using feedback to maximize the utilization of network as well as the quality of service have been the focus of recent research activities for ATM(Asynchronous Transfer Mode). This study has been extended from the point-to-point connection to a point-to-multipoint environment as the number of applications requiring multicast service increases. It is known that the effectiveness of feedback based congestion control scheme diminishes as propagation delay increases. Especially for a multicast connection consisting of various paths and destinations with different performance and congestion status, the problem of unfairness due to different propagation delays may occur. The degree of such unfairness may change depending on various aspects of congestion control schemes. These has been, however, relatively little study on these problems. In this paper, we present how various aspects of control schemes-length of the interval between feedback generations, point of time to coalesce feedback cells from child paths, decreasing factor of source rate in case of congestion-affect the degree of unfairness. Simulation results show that degree of unfairness changes according to when the feedback coalescing happens. Expecially it is shown that the effect of feedback coalescing time to the degree of unfairness is more significant for the smaller feedback interval. It is also found that as the source rate decreasing factor becomes larger the average ACR(Allowed Cell Rate) at the source gets lower and the degree of unfairness grow larger.

  • PDF

Effect of Interference in CSMA/CA Based MAC Protocol for Underwater Network (CSMA/CA 기반 수중 통신망에서 간섭의 영향 연구)

  • Song, Min-je;Cho, Ho-shin;Jang, Youn-seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1631-1636
    • /
    • 2015
  • With the advance of wireless communication technology in terrestrial area, underwater communication is also evolving very fast from a simple point-to-point transmission to an elaborate networked communications. Underwater acoustic channel has quite different features comparing with the terrestrial radio channel in terms of propagation delay, Doppler shift, multipath, and path loss. Thus, existing technologies developed for terrestrial communication might not work properly in underwater channel. Especially medium access control (MAC) protocols which highly depend on propagation phenomenon should be newly designed for underwater network. CSMA/CA has drawn lots of attention as a candidate of underwater MAC protocol, since it is able to resolve a packet collision and the hidden node problem. However, a received signal could be degraded by the interferences from the nodes locating outside the receiver's propagation radius. In this paper, we study the effects of interference on the CSMA/CA based underwater network. We derived the SNR with the interference using the sonar equation and analyzed the degradation of the RTS/CTS effects. These results are compared with the terrestrial results to understand the differences. Finally we summarized the design considerations in CSMA/CA based underwater network.

Reliable Real-Time Data Dissemination Protocol in Wireless Sensor Networks (무선 센서 망에서 신뢰적 실시간 데이터 전송 프로토콜)

  • Yang, Taehun;Yim, Yongbin;Jung, Kwansoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1567-1576
    • /
    • 2015
  • This paper proposes a reliable real-time data dissemination protocol for mitigating transmission failure of real-time data in WSNs. The re-transmission is well-known for recovery of transmission failure, but this may violate the real-time requirement by transmission delay. To solve this problem, the proposed protocol exploits broadcasting nature and temporal opportunity allocation. In a radio-range of sending node, there may be neighbors satisfying the real-time requirement. The neighbors of specific node could receive data simultaneously by broadcasting, and decide their priority using temporal opportunity allocation method. The method uses time slot and tolerable time. The time slot specifies the priority and transmission deadline for each neighbors, and the tolerable time is the real-time requirement at the sending node. By giving the priority to the node with shorter tolerable time in each slot, we may get more opportunities to forward toward the destination. In other words, even if a node have the longer tolerable time, it still has a chance to forward with the real-time requirement. Simulation results show that the proposed protocol is superior to the existing protocols.