• Title/Summary/Keyword: Performance Information Use

Search Result 5,694, Processing Time 0.036 seconds

Operating Conditions Proposal of Bandgap Circuit at Cryogenic Temperature for Signal Processing of Infrared Detector and a Performance Analysis of a Manufactured Chip (적외선 탐색기 신호처리를 위한 극저온 밴드갭 회로 동작 조건 제안 및 제작된 칩의 성능 분석)

  • Kim Yon Kyu;Kang Sang-Gu;Lee Hee-Chul
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.12
    • /
    • pp.59-65
    • /
    • 2004
  • A stable reference voltage generator is necessary to the infrared image signal readout circuit(ROIC) to improve noise characteristics of signal originated from infrared devices, that is, to gain good images. In this paper, bandgap circuit operating at cryogenic temperature of 77K for Infrared image ROIC(readout integrated circuit) was first made. It demonstrates practical use possibility through taking measurements and estimations. Bandgap circuit is a representative voltage reference circuit. Most of bandgap reference circuits which are presented so far operate at room temperature, and their characteristic are not suitable for infrared image ROIC operating at liquid nitrogen temperature, 77K. To design bandgap circuit operating at cryogenic temperature, suitable circuit is selected and the parameter characteristics of used devices as temperature change are seen by a theoretical study and fitted at liquid temperature with considering such characteristics. This circuit has been fabricated in the Hynix 0.6um standard CMOS process, and the output voltage measured shows that the stability is 1.042±0.0015V over the temperature range of 60K to 110K and is better than bandgap circuits operated at room temperature.

RFID Reader Anti-collision Algorithm using the Channel Monitoring Mechanism (채널 모니터링 기법을 이용한 RFID 리더 충돌방지 알고리즘)

  • Lee Su-Ryun;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.35-46
    • /
    • 2006
  • When an RFID reader attempts to read the tags, interference might occur if the neighboring readers also attempt to communicate with the same tag at the same time or the neighboring readers use the same frequency simultaneously. These interferences cause the RFID reader collision. When the RFID reader collision occurs, either the command from the reader cannot be transmitted to the tags or the response of the tags cannot receive to the reader correctly, Therefore, the international standard for RFID and some papers proposed the methods to reduce the reader collision. Among those, Colorwave and Enhanced Colorwave is the reader anti-collision algorithm using the frame slotted ALOHA based a TDM(Time Division Multiplex) and are able to reduce the reader collision because theses change the frame size according to a collision probability. However, these can generate the reader collisions or interrupt the tag reading of other readers because the reader that collides with another reader randomly chooses a new slot in the frame. In this paper, we propose a new RFID reader anti-collision algorithm that each reader monitors the slots in the frame and chooses the slot having the minimum occupation probability when the reader collision occurs. Then we analyze the performance of the proposed algorithm using simulation tool.

The Analysis and Design of Advanced Neurofuzzy Polynomial Networks (고급 뉴로퍼지 다항식 네트워크의 해석과 설계)

  • Park, Byeong-Jun;O, Seong-Gwon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.3
    • /
    • pp.18-31
    • /
    • 2002
  • In this study, we introduce a concept of advanced neurofuzzy polynomial networks(ANFPN), a hybrid modeling architecture combining neurofuzzy networks(NFN) and polynomial neural networks(PNN). These networks are highly nonlinear rule-based models. The development of the ANFPN dwells on the technologies of Computational Intelligence(Cl), namely fuzzy sets, neural networks and genetic algorithms. NFN contributes to the formation of the premise part of the rule-based structure of the ANFPN. The consequence part of the ANFPN is designed using PNN. At the premise part of the ANFPN, NFN uses both the simplified fuzzy inference and error back-propagation learning rule. The parameters of the membership functions, learning rates and momentum coefficients are adjusted with the use of genetic optimization. As the consequence structure of ANFPN, PNN is a flexible network architecture whose structure(topology) is developed through learning. In particular, the number of layers and nodes of the PNN are not fixed in advance but is generated in a dynamic way. In this study, we introduce two kinds of ANFPN architectures, namely the basic and the modified one. Here the basic and the modified architecture depend on the number of input variables and the order of polynomial in each layer of PNN structure. Owing to the specific features of two combined architectures, it is possible to consider the nonlinear characteristics of process system and to obtain the better output performance with superb predictive ability. The availability and feasibility of the ANFPN are discussed and illustrated with the aid of two representative numerical examples. The results show that the proposed ANFPN can produce the model with higher accuracy and predictive ability than any other method presented previously.

Performance Evaluation and Offset Time Decision for Supporting Differential Multiple Services in Optical Burst Switched Networks (광 버스트 교환 망에서 차등적 다중 서비스 제공을 위한 offset 시간 결정 및 성능 평가)

  • So W.H.;im Y.C.K
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • In this paper, we take advantage of the characteristics of optical burst switching (OBS) to support service-differentiation in optical networks. With the offset time between control packet and burst data, the proposed scheme uses different offset time of each service class. As contrasted with the Previous method, in which the high Priority service use only long offset time, it derives the burst loss rate as a QoS parameter in consideration of conservation law and given service-differential ratios and decides a reasonable offset time for this QoS finally Firstly proposed method classifies services into one of high or low class and is an algorithm deciding the offset time for supporting the required QoS of high class. In order to consider the multi-classes environment, we expand the analysis method of first algorithm and propose the second algorithm. It divides services into one of high or low group according to their burst loss rate and decides the offset time for high group, and lastly cumulates the offset time of each class. The proposed algorithms are evaluated through simulation. The result of simulation is compared with that of analysis to verify the proposed scheme.

A Feature Point Extraction and Identification Technique for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 추출 및 식별 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.529-535
    • /
    • 2020
  • As the main technology of the 4th industrial revolution, immersive 360-degree video contents are drawing attention. The market size of immersive 360-degree video contents worldwide is projected to increase from $6.7 billion in 2018 to approximately $70 billion in 2020. However, most of the immersive 360-degree video contents are distributed through illegal distribution networks such as Webhard and Torrent, and the damage caused by illegal reproduction is increasing. Existing 2D video industry uses copyright filtering technology to prevent such illegal distribution. The technical difficulties dealing with immersive 360-degree videos arise in that they require ultra-high quality pictures and have the characteristics containing images captured by two or more cameras merged in one image, which results in the creation of distortion regions. There are also technical limitations such as an increase in the amount of feature point data due to the ultra-high definition and the processing speed requirement. These consideration makes it difficult to use the same 2D filtering technology for 360-degree videos. To solve this problem, this paper suggests a feature point extraction and identification technique that select object identification areas excluding regions with severe distortion, recognize objects using deep learning technology in the identification areas, extract feature points using the identified object information. Compared with the previously proposed method of extracting feature points using stitching area for immersive contents, the proposed technique shows excellent performance gain.

On-line Handwriting Chinese Character Recognition for PDA Using a Unit Reconstruction Method (유닛 재구성 방법을 이용한 PDA용 온라인 필기체 한자 인식)

  • Chin, Won;Kim, Ki-Doo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.1
    • /
    • pp.97-107
    • /
    • 2002
  • In this paper, we propose the realization of on-line handwritten Chinese character recognition for mobile personal digital assistants (PDA). We focus on the development of an algorithm having a high recognition performance under the restriction that PDA requires small memory storage and less computational complexity in comparison with PC. Therefore, we use index matching method having computational advantage for fast recognition and we suggest a unit reconstruction method to minimize the memory size to store the character models and to accomodate the various changes in stroke order and stroke number of each person in handwriting Chinese characters. We set up standard model consisting of 1800 characters using a set of pre-defined units. Input data are measured by similarity among candidate characters selected on the basis of stroke numbers and region features after preprocessing and feature extracting. We consider 1800 Chinese characters adopted in the middle and high school in Korea. We take character sets of five person, written in printed style, irrespective of stroke ordering and stroke numbers. As experimental results, we obtained an average recognition time of 0.16 second per character and the successful recognition rate of 94.3% with MIPS R4000 CPU in PDA.

Iris Feature Extraction using Independent Component Analysis (독립 성분 분석 방법을 이용한 홍채 특징 추출)

  • 노승인;배광혁;박강령;김재희
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.20-30
    • /
    • 2003
  • In a conventional method based on quadrature 2D Gator wavelets to extract iris features, the iris recognition is performed by a 256-byte iris code, which is computed by applying the Gabor wavelets to a given area of the iris. However, there is a code redundancy because the iris code is generated by basis functions without considering the characteristics of the iris texture. Therefore, the size of the iris code is increased unnecessarily. In this paper, we propose a new feature extraction algorithm based on the ICA (Independent Component Analysis) for a compact iris code. We implemented the ICA to generate optimal basis functions which could represent iris signals efficiently. In practice the coefficients of the ICA expansions are used as feature vectors. Then iris feature vectors are encoded into the iris code for storing and comparing an individual's iris patterns. Additionally, we introduce two methods to enhance the recognition performance of the ICA. The first is to reorganize the ICA bases and the second is to use a different ICA bases set. Experimental results show that our proposed method has a similar EER (Equal Error Rate) as a conventional method based on the Gator wavelets, and the iris code size of our proposed methods is four times smaller than that of the Gabor wavelets.

Development and Application of the e-learning courseware about the Earth Science I (based on the Earth Environmental Change) (지구과학 I의 e-learning 교수·학습자료 개발 및 적용 - 지구환경변화 단원을 중심으로 -)

  • Kim, Yun-Jeong;Lim, Seong-Kyu
    • Journal of Science Education
    • /
    • v.32 no.2
    • /
    • pp.17-32
    • /
    • 2008
  • The purpose of this study was to analyze the use of the e-learning courseware which is about the properties of earth environmental change. I made these materials using Lectora program, and to have more visual effect, I used movies and animations as much as possible. A lot of movies and pictures are added to help student understand the geographical age. Especially the forms of performance test questions are various, and student can check the answer right after taking test. Because of this, they can get a immediate feedback. In addition, this allows you to adapt yourself to the age of information by using the internet. Every plug-in is already linked together, so you only need to once. Pictures and moving reflections can be edited with ease. I hope this study will provide valuable aid for the education of earth science and a chance to develop better materials.

  • PDF

A Variable Speed Limits Operation Model to Minimize Confliction at a Bottleneck Section by Cumulative Demand-Capacity Analysis (대기행렬이론을 이용한 병목지점 충돌위험 저감 가변속도제어 운영모형)

  • LEE, Junhyung;SON, Bongsoo
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.5
    • /
    • pp.478-487
    • /
    • 2015
  • This study proposed a Variable Speed Limits(VSL) algorithm to use traffic information based on Cumulative Demand-Capacity Analysis and evaluated its performance. According to the analysis result, the total of delay consisted of 3 separate parts. There was no change in total travel time although the total of delay decreased. These effects was analysed theoretically and then, evaluated through VISSIM, a microscopic simulator. VISSIM simulation results show almost same as those of theoretical analysis. Furthermore in SSAM analysis with VISSIM simulation log, the number of high risk collisions decreased 36.0 %. However, the total delay decrease effect is not real meaning of decrease effect because the drivers' desired speed is same whether the VSL model is operated or not. Nevertheless this VSL model maintains free flow speed for longer and increases the cycle of traffic speed fluctuation. In other words, this is decrease of delay occurrence and scale. The decrease of speed gap between upstream and downstream stabilizes the traffic flow and leads decrease number of high risk collision. In conclusion, we can expect increase of safety through total delay minimization according to this VSL model.

Performance Evaluation of the MAC Protocols for WDM Metro Ring with Wavelength-Shared Nodes Connecting Broadband Access Networks (대역 액세스 망을 연결하는 파장 공유 노드 기반 WDM 메트로 링의 MAC 프로토콜 성능 평가)

  • So Won-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.111-120
    • /
    • 2006
  • In this paper, a node architecture of WDM metro network for connecting broadband access networks to converge wire/wireless networks. In consideration of the proposed node architecture and network requirements we proposed and evaluated medium access control protocols. We review WDM related technologies of sub-carrier multiplexing and optical components in order to resolve the bottleneck between optical backbone networks md access networks, and a access node architecture sharing common wavelength is introduced. Source-stripping (SS) MAC protocol Is evaluated under the proposed functional node architecture. DS+IS (Destination-Stripping and Source-Stripping) and DS+IS (Destination-Stripping and Intermediate-Stripping) MAC protocols are described to increase the slot-reuse factor which is low on SS MAC protocol. The key function of new MAC protocols regards the optical switch module of proposed node architecture and helps intermediate or source access nodes for dropping slots to destinations of different wavelength group. Thus, slot-reuse factor increases as the MAC protocols reduce the unnecessary ring-rotation of transferred slots. We use a numerical analysis to expect bandwidth efficiency and maximum throughput by slot-reuse factor Throughput network simulation, the verification of throughput, queuing delay, and transmission fairness are compared among MAC protocols.