• Title/Summary/Keyword: Multi-transmit

Search Result 485, Processing Time 0.03 seconds

Fabrication of Ultra-Small Multi-Layer Piezoelectric Vibrational Device Using P(VDF-TrFE-CFE) (P(VDF-TrFE-CFE)를 이용한 초소형 압전 적층형 진동 출력 소자의 제작)

  • Cho, Seongwoo;Glasser, Melodie;Kim, Jaegyu;Ryu, Jeongjae;Kim, Yunjeong;Kim, Hyejin;Park, Kang-Ho;Hong, Seungbum
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.32 no.2
    • /
    • pp.157-160
    • /
    • 2019
  • P(VDF-TrFE-CFE) (Poly (vinylidene fluoride-trifluoroethylene-chlorofluoroethylene)), which exhibits a high electrostriction of about 7%, can transmit tactile output as vibration or displacement. In this study, we investigated the applicability of P(VDF-TrFE-CFE) to wearable piezoelectric actuators. The P(VDF-TrFE-CFE) layers were deposited through spin-coating, and interspaced with patterned Ag electrodes to fabricate a two-layer $3.5mm{\times}3.5mm$ device. This layered structure was designed and fabricated to increase the output and displacement of the actuator at low driving voltages. In addition, a laser vibrometer and piezoelectric force microscope were used to analyze the device's vibration characteristics over the range of ~200~4,200 Hz. The on-off characteristics were confirmed at a frequency of 40 Hz.

A Study on how to use drones According to Domestic Coastal Safety System limitations (국내 연안 안전 체계 한계에 따른 드론의 활용방안)

  • Kim, Seung-Han;Kim, Hyo-Joong;Kim, Hyo-Kwan;Cho, So-Hyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.118-127
    • /
    • 2021
  • In spite of various safety measures, coastal safety accidents continue to occur, so this study focused on using drones as countermeasures. Municipalities that already have coasts have begun operating unmanned multicopters for coastal safety management. In particular, by connecting an unmanned multi-copter to the currently applied smart city safety net system, it is possible to transmit real-time images of the scene in case of emergency in the coastal area to the local government safety information center. It is also expected to contribute significantly to strengthening safety management in coastal waters through a more rapid response to safety accidents. Therefore, in this paper, we propose the use of drones as an alternative to the limitations of the domestic coastal safety system by investigating the state of coastal safety accidents and analyzing the state of domestic coastal safety systems. In addition, it is expected to be a key breakthrough in the coastal area safety system by proposing a model linking the Korean K-Drone system.

Outage Performance of Uplink NOMA Systems with CDF Scheduling (CDF 스케쥴링을 적용한 상향링크 NOMA 시스템의 오수신 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.37-42
    • /
    • 2021
  • NOMA (Non-orthogonal multiple Access) system has been focused on the next generation cellular system for higher spectral efficiency. However, this requires user scheduling as the NOMA system is a multi-user system which accesses simultaneously. There are two representative scheduling schemes, proportionate scheduling (FP) and cumulative distribution function (CFD) scheduling. The PF scheduling is applied, the cell edge user is hard to obtain a transmit opportunity. Recently, CDF scheduling is obviously noted that it offers the same possibility of transmission for a user regardless of the location in a cell. We consider an uplink NOMA system with CDF scheduling, and obtain the channel access probabilities, the outage probabilities of the system with different number of users and different kinds of weights through simulation. The results indicate that the likelihood of each user accessing the channel is the same and the probability of failure decreases as the number of users increases. We found that the effect of the probability of failure is negligible as the weight of the cell edge user increases.

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

The Secure Password Authentication Method based on Multiple Hash Values that can Grant Multi-Permission to a Single Account (단수 계정에 다중 권한 부여가 가능한 다중 해시값 기반의 안전한 패스워드 인증 기법 설계)

  • Hyung-Jin Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2023
  • ID is used as identifying information and password as user authentication for ID-based authentication. In order to have a secure user authentication, the password is generated as a hash value on the client and sent to the server, where it is compared with the stored information and authentication is performed. However, if even one character is incorrect, the different hash value is generated, authentication will be failed and cannot be performed and various functions cannot be applied to the password. In this study, we generate several hash value including imaginary number of entered password and transmit to server and perform authentcation. we propose a technique can grants the right differentially to give various rights to the user who have many rights by one account. This can defend shoulder surfing attack by imaginary password and provide convenience to users who have various rights by granting right based on password.

Digital Hologram Compression Technique using Multi-View Prediction based on Image Accumulation (영상집적 기반의 다시점 부호화 기술을 이용한 디지털 홀로그램의 압축 기술)

  • Choi, Hyun-Jun;Seo, Young-Ho;Bae, Jin-Woo;Yoo, Ji-Sang;Kim, Hwa-Sung;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.933-941
    • /
    • 2006
  • In this paper, we proposed an efficient coding method for digital hologram (fringe pattern) acquired by a CCD camera or by computer generation using multi-view prediction technique and MPEG video compression standard technique. It proceeds each R, G, or B color component separately. The basic processing unit is a partial image segmented into the size of $N{\times}N$. Each partial image retains the information of the whole object. This method generates an assembled image for a row of the segmented and frequency-transformed partial images, which is the basis of the coding process. That is, a motion estimation and compensation technique of MPEG is applif:d to the reconstructed images from the assembled images with the disparities found during generation of assembled image and the original partial images. Therefore the compressed results are the disparity of eachpartial image to form the assembled image for the corresponding row, assembled image, and the motion vectors and the compensated image for each partial image. The experimental results with the implemented algorithm showed that the proposed method has NC (Normal Correlation) values about 4% higher than the previous method, by which ours has better compression efficiency. Consequently, the Proposed method is expected to be used effectively in the application areas to transmit the digital hologram data. can be identified in comparison with the previous researches and commercial IPs.

Multi-hop Routing Protocol based on Neighbor Conditions in Multichannel Ad-hoc Cognitive Radio Networks (인지 무선 애드혹 네트워크에서의 주변 상황을 고려한 협력적 멀티홉 라우팅 방법)

  • Park, Goon-Woo;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.369-379
    • /
    • 2011
  • During the routing process between nodes on the CR(Cognitive Radio) network conducting for efficient use of limited frequency resources, spectrum handover process due to the appearance of the PU occupies most of the routing latency, and also decreases the reliability of the path. In this paper, a cooperative routing protocol in a multi-channel environment is proposed. The source node broadcasts a message with available channel lists and probability of PU appearance during its route guidance. The intermediate nodes re-transmit the message, received from the source node, and update and maintain the information, status table of the path. The destination node determines the optimal path and sends a reply message to the selected path after it receives the messages from the intermediate nodes. The average probability of the PU appearance and the average time of the PU appearance are updated while transferring data. During data transmission the channel with the lowest probability of appearance of the PU is selected dynamically and if a PU appears on the current channel partial repairment is performed. It is examined that reliability of the selected path considerably is improved and the routing cost is reduced significantly compared to traditional routing methods.

A study on improvement of ISO/IEC 29157 MAC protocol (ISO/IEC 29157 표준 MAC 프로토콜 개선 연구)

  • Cha, Bong-Sang;Jeong, Eui-Hoon;Jeon, Gwangil;Seo, Dae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.17-26
    • /
    • 2013
  • ISO/IEC 29157 originally developed in the Republic of Korea and is based on commercially available PicoCast v1.0. ISO/IEC JTC1 SC6 was registered by the international standard on May 2010. A single platform for a variety of applications and media formats to support development objectives were. ISO/IEC 29157 based wireless networks, ie, Pico-net to master node periodically transmit sync signal is synchronized to the number of slave nodes have the communications structure. Pico-net also supports a variety of network topologies and direct communication between nodes(single-hop communication) and QoS is guaranteed. But Pico-net network structure has the following problems. Loss of communication problems due to mobile nodes, resulting in limitations of node mobility and wireless network operation range of conventional wireless networks operating range less than 1/4 was reduced to the problem. In this paper, a possible solution to the problems mentioned is proposed, using multi-hop communication technology and sync signal transmission technology between nodes.

Characterization of Rabbit Retinal Ganglion Cells with Multichannel Recording (다채널기록법을 이용한 토끼 망막 신경절세포의 특성 분석)

  • Cho Hyun Sook;Jin Gye-Hwan;Goo Yong Sook
    • Progress in Medical Physics
    • /
    • v.15 no.4
    • /
    • pp.228-236
    • /
    • 2004
  • Retinal ganglion cells transmit visual scene as an action potential to visual cortex through optic nerve. Conventional recording method using single intra- or extra-cellular electrode enables us to understand the response of specific neuron on specific time. Therefore, it is not possible to determine how the nerve impulses in the population of retinal ganglion cells collectively encode the visual stimulus with conventional recording. This requires recording the simultaneous electrical signals of many neurons. Recent advances in multi-electrode recording have brought us closer to understanding how visual information is encoded by population of retinal ganglion cells. We examined how ganglion cells act together to encode a visual scene with multi-electrode array (MEA). With light stimulation (on duration: 2 sec, off duration: 5 sec) generated on a color monitor driven by custom-made software, we isolated three functional types of ganglion cell activities; ON (35.0$\pm$4.4%), OFF (31.4$\pm$1.9%), and ON/OFF cells (34.6$\pm$5.3%) (Total number of retinal pieces = 8). We observed that nearby neurons often fire action potential near synchrony (< 1 ms). And this narrow correlation is seen among cells within a cluster which is made of 6~8 cells. As there are many more synchronized firing patterns than ganglion cells, such a distributed code might allow the retina to compress a large number of distinct visual messages into a small number of ganglion cells.

  • PDF

FH DFT-Spreading OFDM System for the Effective Channel Estimation and PAPR Reduction in Jamming Channel (재밍 채널에서 효과적 채널 추정과 PAPR 저감을 위한 주파수 도약 DFT-Spreading OFDM 시스템)

  • Kim, Jang-Su;Ryu, Heung-Gyoon;Lee, Seung-Jun;Ko, Dong-Kuk
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.796-804
    • /
    • 2010
  • It is important to use the comb type pilot allocation for the continuous channel and efficient processing. And DFT-spreading OFDM is used a lot to solve high PAPR problem of OFDM system. However, PAPR is increased again when comb type pilot is used to estimate channel characteristics. So, in this paper, we employ a new SLM method to DFT-spreading OFDM system to reduce increased high PAPR. And we suggest an effective method to transmit side information without additional bandwidth. Pilot and side information must be preserved from jamming or intentional interferences since those are very important in DFT spread OFDM system using SLM. So, in this paper, we like to analyze and simulate the performance of DFT spread OFDM system based on SLM against jamming signal. To remedy the vulnerable shortcomings of DFT spread OFDM about jamming or intentional interferences, we employ FH(Frequency Hopping) method and analyze system performance under the several jamming conditions such as MTJ(Multi Tone Jamming) and PBJ(Partial Band Jamming).