• Title/Summary/Keyword: Key Points

Search Result 945, Processing Time 0.028 seconds

Theoretical Limits Analysis of Indoor Positioning System Using Visible Light and Image Sensor

  • Zhao, Xiang;Lin, Jiming
    • ETRI Journal
    • /
    • v.38 no.3
    • /
    • pp.560-567
    • /
    • 2016
  • To solve the problem of parameter optimization in image sensor-based visible light positioning systems, theoretical limits for both the location and the azimuth angle of the image sensor receiver (ISR) are calculated. In the case of a typical indoor scenario, maximum likelihood estimations for both the location and the azimuth angle of the ISR are first deduced. The Cramer-Rao Lower Bound (CRLB) is then derived, under the condition that the observation values of the image points are affected by white Gaussian noise. For typical parameters of LEDs and image sensors, simulation results show that accurate estimates for both the location and azimuth angle can be achieved, with positioning errors usually on the order of centimeters and azimuth angle errors being less than $1^{\circ}$. The estimation accuracy depends on the focal length of the lens and on the pixel size and frame rate of the ISR, as well as on the number of transmitters used.

Design and FPGA Implementation of the Scalar Multiplier for a CryptoProcessor based on ECC(Elliptic Curve Cryptographics) (ECC(Elliptic Curve Crptographics) 기반의 보안프로세서를 위한 스칼라 곱셈기의 FPGA 구현)

  • Choi, Seon-Jun;Hwang, Jeong-Tae;Kim, Young-Chul
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.1071-1074
    • /
    • 2005
  • The ECC(Elliptic Curve Cryptogrphics), one of the representative Public Key encryption algorithms, is used in Digital Signature, Encryption, Decryption and Key exchange etc. The key operation of an Elliptic curve cryptosystem is a scalar multiplication, hence the design of a scalar multiplier is the core of this paper. Although an Integer operation is computed in infinite field, the scalar multiplication is computed in finite field through adding points on Elliptic curve. In this paper, we implemented scalar multiplier in Elliptic curve based on the finite field $GF(2^{163})$. And we verified it on the Embedded digital system using Xilinx FPGA connected to an EISC MCU(Agent 2000). If my design is made as a chip, the performance of scalar multiplier applied to Samsung $0.35\;{\mu}m$ Phantom Cell Library is expected to process at the rate of 8kbps and satisfy to make up an encryption processor for the Embedded digital information home system.

  • PDF

Crack identification based on Kriging surrogate model

  • Gao, Hai-Yang;Guo, Xing-Lin;Hu, Xiao-Fei
    • Structural Engineering and Mechanics
    • /
    • v.41 no.1
    • /
    • pp.25-41
    • /
    • 2012
  • Kriging surrogate model provides explicit functions to represent the relationships between the inputs and outputs of a linear or nonlinear system, which is a desirable advantage for response estimation and parameter identification in structural design and model updating problem. However, little research has been carried out in applying Kriging model to crack identification. In this work, a scheme for crack identification based on a Kriging surrogate model is proposed. A modified rectangular grid (MRG) is introduced to move some sample points lying on the boundary into the internal design region, which will provide more useful information for the construction of Kriging model. The initial Kriging model is then constructed by samples of varying crack parameters (locations and sizes) and their corresponding modal frequencies. For identifying crack parameters, a robust stochastic particle swarm optimization (SPSO) algorithm is used to find the global optimal solution beyond the constructed Kriging model. To improve the accuracy of surrogate model, the finite element (FE) analysis soft ANSYS is employed to deal with the re-meshing problem during surrogate model updating. Specially, a simple method for crack number identification is proposed by finding the maximum probability factor. Finally, numerical simulations and experimental research are performed to assess the effectiveness and noise immunity of this proposed scheme.

Experimental study on high gravity dam strengthened with reinforcement for seismic resistance on shaking table

  • Wang, Mingming;Chen, Jianyun;Fan, Shuli;Lv, Shaolan
    • Structural Engineering and Mechanics
    • /
    • v.51 no.4
    • /
    • pp.663-683
    • /
    • 2014
  • In order to study the dynamic failure mechanism and aseismic measure for high concrete gravity dam under earthquake, the comparative models experiment on the shaking table was conducted to investigate the dynamic damage response of concrete gravity dam with and without the presence of reinforcement and evaluate the effectiveness of the strengthening measure. A new model concrete was proposed and applied for maintaining similitude with the prototype. A kind of extra fine wires as a substitute for rebar was embedded in four-points bending specimens of the model concrete to make of reinforced model concrete. The simulation of reinforcement concrete of the weak zones of high dam by the reinforced model concrete meets the similitude requirements. A tank filled with water is mounted at the upstream of the dam models to simulate the reservoir. The Peak Ground Acceleration (PGA) that induces the first tensile crack at the head of dam is applied as the basic index for estimating the overload capacity of high concrete dams. For the two model dams with and without strengthening tested, vulnerable parts of them are the necks near the crests. The results also indicate that the reinforcement is beneficial for improving the seismic-resistant capacity of the gravity dam.

An Analysis of Key Elements for FinTech Companies Based on Text Mining: From the User's Review (텍스트 마이닝 기반의 자산관리 핀테크 기업 핵심 요소 분석: 사용자 리뷰를 바탕으로)

  • Son, Aelin;Shin, Wangsoo;Lee, Zoonky
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.137-151
    • /
    • 2020
  • Purpose Domestic asset management fintech companies are expected to grow by leaps and bounds along with the implementation of the "Data bills." Contrary to the market fever, however, academic research is insufficient. Therefore, we want to analyze user reviews of asset management fintech companies that are expected to grow significantly in the future to derive strengths and complementary points of services that have been provided, and analyze key elements of asset management fintech companies. Design/methodology/approach To analyze large amounts of review text data, this study applied text mining techniques. Bank Salad and Toss, domestic asset management application services, were selected for the study. To get the data, app reviews were crawled in the online app store and preprocessed using natural language processing techniques. Topic Modeling and Aspect-Sentiment Analysis were used as analysis methods. Findings According to the analysis results, this study was able to derive the elements that asset management fintech companies should have. As a result of Topic Modeling, 7 topics were derived from Bank Salad and Toss respectively. As a result, topics related to function and usage and topics on stability and marketing were extracted. Sentiment Analysis showed that users responded positively to function-related topics, but negatively to usage-related topics and stability topics. Through this, we were able to extract the key elements needed for asset management fintech companies.

Secure Handover Using Inter-Access Point Protocol in Wireless LAN (무선 LAN에서 Inter-Access Point Protocol을 이용한 안전한 핸드오버)

  • DaeHun Nyang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.107-112
    • /
    • 2003
  • Handover in IEEE 802.11 requires repeated authentication and key exchange procedures, which are an obstacle to seamless services of wireless LAM. We propose a fast authentication and key exchange mechanism using IEEE 802.11f. Especially, by proposing a modified version of the 4-way handshake of IEEE 802.11i, we solve the perfect forward secrecy problem that arises when the pre-authentication is adopted. The scheme can be implemented only using the Context Block of IEEE 802.11f and the 4-way handshake of IEEE 802.11i without involving authentications server's interaction or non-standard behavior between access points. Our scheme is applicable to devices not supporting the us-authentication of IEEE 802.11i and also, it can substitute the pre-authentication when the pre-authentication is failed.

Dual-function Dynamically Tunable Metamaterial Absorber and Its Sensing Application in the Terahertz Region

  • Li, You;Wang, Xuan;Zhang, Ying
    • Current Optics and Photonics
    • /
    • v.6 no.3
    • /
    • pp.252-259
    • /
    • 2022
  • In this paper, a dual-function dynamically tunable metamaterial absorber is proposed. At frequency points of 1.545 THz and 3.21 THz, two resonance peaks with absorption amplitude of 93.8% (peak I) and 99.4% (peak II) can be achieved. By regulating the conductivity of photosensitive silicon with a pump laser, the resonance frequency of peak I switches to 1.525 THz, and that of peak II switches to 2.79 THz. By adjusting the incident polarization angle by rotating the device, absorption amplitude tuning is obtained. By introducing two degrees of regulation freedom, the absorption amplitude modulation and resonant frequency switching are simultaneously realized. More importantly, dynamic and continuous adjustment of the absorption amplitude is obtained at a fixed resonant frequency, and the modulation depth reaches 100% for both peaks. In addition, the sensing property of the proposed MMA was studied while it was used as a refractive index sensor. Compared with other results reported, our device not only has a dual-function tunable characteristic and the highest modulation depth, but also simultaneously possesses fine sensing performance.

Soil sampling plan design of key facilities for denuclearization based on data quality objective process

  • Jeon, Yeoryeong;Kim, Yongmin
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3788-3794
    • /
    • 2022
  • The possibility of denuclearization of the Korean Peninsula has been continuously debated, and the initiative participation of the Republic of Korea has necessitated preemptive measures against neighboring countries. In this study, we present a proposal for formulating a site survey plan when the amount of site information provided is insufficient and the accuracy of the information is not guaranteed. Considering a case wherein "a soil sample analysis is used to determine the presence or absence of nuclear activity" in a radiochemical laboratory, which is a typical key facility for denuclearization, the optimal soil sample collection plan is designed based on international guidelines and public information. In the event of denuclearization, a scenario that is not based on the expertise of the sample collector is set, and the data quality objective (DQO) process is applied to ensure reality. Consequently, the primary sample collection points can be derived in consideration of accessibility, and the sample collection scale can be adjusted according to the cost. By applying the DQO process to ensure sample representativeness and reality, reliable and resource-efficient soil sample collection can be achieved in radiochemical laboratories and other denuclearization facilities.

An improved multiple-vertical-line-element model for RC shear walls using ANN

  • Xiaolei Han;Lei Zhang;Yankun Qiu;Jing Ji
    • Earthquakes and Structures
    • /
    • v.25 no.5
    • /
    • pp.385-398
    • /
    • 2023
  • The parameters of the multiple-vertical-line-element model (MVLEM) of reinforced concrete (RC) shear walls are often empirically determined, which causes large simulation errors. To improve the simulation accuracy of the MVLEM for RC shear walls, this paper proposed a novel method to determine the MVLEM parameters using the artificial neural network (ANN). First, a comprehensive database containing 193 shear wall specimens with complete parameter information was established. And the shear walls were simulated using the classic MVLEM. The average simulation errors of the lateral force and drift of the peak and ultimate points on the skeleton curves were approximately 18%. Second, the MVLEM parameters were manually optimized to minimize the simulation error and the optimal MVLEM parameters were used as the label data of the training of the ANN. Then, the trained ANN was used to generate the MVLEM parameters of the collected shear walls. The results show that the simulation error of the predicted MVLEM was reduced to less than 13% from the original 18%. Particularly, the responses generated by the predicted MVLEM are more identical to the experimental results for the testing set, which contains both flexure-control and shear-control shear wall specimens. It indicates that establishing MVLEM for RC shear walls using ANN is feasible and promising, and that the predicted MVLEM substantially improves the simulation accuracy.

Case Study of Color Marketing for Fashion Industry (패션산업(産業)의 컬러마케팅 적용사례연구(適用事例硏究))

  • Ko, Eun-Ju;Lee, Jee-Hyun
    • Journal of Fashion Business
    • /
    • v.7 no.1
    • /
    • pp.55-71
    • /
    • 2003
  • The purpose of this research are to enhance the understanding of color marketing and to suggest future implementation strategy in the fashion industry. To do so, (1) the concept, requirements, tactics are discussed, (2) various cases are analyzed and key points of color marketing are suggested, (3) the current situation of color marketing and the problems are discussed, and (4) the future implementation strategies for the fashion industry are suggested.