• Title/Summary/Keyword: SC algorithm

Search Result 288, Processing Time 0.026 seconds

$H_\infty$ Optimal Controller Synthesis by the Frequency Domain Analysis of Weighting Function (가중함수의 주파수 영역 해석에 따른 $H_\infty$ 최적 제어기 구성)

  • Kim, Yong-Gyu;Ryu, Chang-Geun
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.2
    • /
    • pp.8-15
    • /
    • 2000
  • This study presents an H$_{\infty}$ optimal controller synthesis by the frequency domain analysis of weighting function. The main purpose of our study is to visualize weighting function domains and open loop transfer function domains that satisfy robustness and performance. Also we aim to simplify the iterative algorithm for H$\infty$ optimal controller synthesis. We report that the designed regulator by the proposed method in this paper satisfies the desired specifications and performance in spite of the plant uncertainty variation at any operating point.

  • PDF

An Efficient If Routing Lookup by Using Routing Interval

  • Wang, Pi-Chung;Chan, Chia-Tai;Chen, Yaw-Chung
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.374-382
    • /
    • 2001
  • Nowadays, the commonly used table lookup scheme for IP routing is based on the sc-called classless interdomain routing (CIDR). With CIDR, routers must find out the best matching prefix (BMP) for IP packets forwarding, this complicates the IP lookup. Currently, this process is mainly performed in software and several schemes hale been proposed for hardware implementation. Since the IP lookup performance is a major design issue for the new generation routers, in this article we investigate the properties of the routing table and present a new approach for IP lookups, our approach is not based Gn BMP and significantly reduces the complexity, thus the computation cast of existing schemes can be significantly reduced. We also propose an efficient IP lookup algorithm, with which we improve the binary search on prefixes to 30 millions of packets per second (MPPS) and 5,000 route updates/s under the same experiment setup with an even larger routing table.

  • PDF

Deadzone compensation of a XY table using fuzzy logic (XY 테이블의 퍼지 데드존 보상)

  • 장준오
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.41 no.2
    • /
    • pp.17-28
    • /
    • 2004
  • A deadzone compensator is designed for a XY positioning table using fuzzy logic. The classification property of fuzzy logic systems makes them a natural candidate for the rejection of errors induced by the deadzone, which has regions in which it behaves differently. A tuning algorithm is given for the fuzzy logic parameters, so that the deadzone compensation scheme becomes adaptive, guaranteeing small tracking errors and bounded parameter estimates. Formal nonlinear stability proofs are given to show that the tracking error is small. The fuzzy logic deadzone compensator is implemented on a XY positioning table to show its efficacy.

Low Latency Encoding Algorithm for Duo-Binary Turbo Codes with Tail Biting Trellises (이중 입력 터보 코드를 위한 저지연 부호화 알고리즘)

  • Park, Sook-Min;Kwak, Jae-Young;Lee, Kwy-Ro
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.2
    • /
    • pp.47-51
    • /
    • 2009
  • The low latency encoder for high data rate duo-binary turbo codes with tail biting trellises is considered. Encoder hardware architecture is proposed using inherent encoding property of duo-binary turbo codes. And we showed that half of execution time as well as the energy can be reduced with the proposed architecture.

Sequential Optimization for Subcarrier Pairing and Power Allocation in CP-SC Cognitive Relay Systems

  • Liu, Hongwu;Jung, Jaijin;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1638-1653
    • /
    • 2014
  • A sequential optimization algorithm (SOA) for resource allocation in a cyclic-prefixed single-carrier cognitive relay system is proposed in this study. Both subcarrier pairing (SP) and power allocation are performed subject to a primary user interference constraint to minimize the mean squared error of frequency-domain equalization at the secondary destination receiver. Under uniform power allocation at the secondary source and optimal power allocation at the secondary relay, the ordered SP is proven to be asymptotically optimal in maximizing the matched filter bound on the signal-to-interference-plus-noise ratio. SOA implements the ordered SP before power allocation optimization by decoupling the ordered SP from the power allocation. Simulation results show that SOA can optimize resource allocation efficiently by significantly reducing complexity.

Parameter-dependent Robust Stability of Uncertain Singular Systems with Time-varying Delays (시변 시간지연을 가지는 불확실 특이시스템의 변수 종속 강인 안정성)

  • Kim, Jong-Hae
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.4
    • /
    • pp.1-6
    • /
    • 2010
  • In this paper, we present a new delay-dependent and parameter-dependent robust stability condition for uncertain singular systems with polytopic parameter uncertainties and time-varying delay. The robust stability criterions based on parameter-dependent Lyapunov function are expressed as LMI (linear matrix inequality). Moreover, the proposed robust stability condition is a general algorithm for both singular systems and non-singular systems. Finally, numerical examples are presented to illustrate the feasibility and less conservativeness of the proposed method.

New State-of-Charge Polynomial using Hermite Interpolation (헤르미트 보간법을 이용한 새로운 SOC 다항식)

  • Jung, Ji-Heung;Jeon, Joon-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.1
    • /
    • pp.9-17
    • /
    • 2011
  • This paper provides, through the use of Hermite Interpolation, a new polynomial for Storage of Charge(SOC) solution of the low-power-battery. It also gives a general formula which permits direct and simple computation of coefficients of the proposed polynomial. From the simulation results based on real SOC, it is shown that this new approach is more accurate and computationally efficient than previous Boltzmann's SOC. This solution provides a new insight into the development of SOC algorithm.

Performance Analysis by Secondary link Frame structure in UAV System (무인기 운용환경을 고려한 보조링크 프레임 구조설계에 따른 성능분석)

  • Yoon, Chang-Bae;Kim, Hoi-Jun;Hong, Su-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1115-1120
    • /
    • 2017
  • In this paper, we apply the LMMSE(: Linear Minimum Mean Square Error) algorithm to overcome the Doppler effect according to the UAV(: Unmanned Aerial Vehicle) velocity in multipath fading channel environment. Simulation results show that the performance difference depends on the pilot arrangement and pattern, and we confirmed that the frame structure proposed in this paper can provide a stable secondary link for high speed UAV system.

Design of a Robust Controller Perturbations using Plant Parameter (플랜트 매개변수 섭동을 이용한 강인 제어기 설계)

  • Hwang, Yu,-Sub
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.19-24
    • /
    • 2005
  • In this paper, some algorithms for robust stabilization of linerar time - invariant single - input - multi output(SIMO) systems subject to parameter perturbatations are presented. .The range of structure perturbation was obtained by using the gradient optimization algorithm. These algorithms iteratively enlarge the stability hypersphere in plant parameter space and can be used to design a robust controller to stabilize a plant subject to givien range of parameter ecxursions.

Information technology - Security techniques - Hash - function - Part 1 : General (ISO/IEC JTC1/SC27의 국제표준소개 (8) : ISO/IEC IS 10118-1 정보기술 - 보안기술 - 해쉬함수, 제 1 부 : 개론)

  • 이필중
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.97-101
    • /
    • 1995
  • 지난 세번에 걸쳐 소개하던 실체인증기법을 중단하고 이번호 부터는 해쉬함수 국제표준을 소개한다. 국내에서도 표준화 노력이 진행되고 있는 해쉬함수는 임의의 길이의 비트스트링을 정해진 길이의 출력인 해쉬코드로 변환시키는 함수로서 디지탈서명, 인증. 키 분배등의 많은 적용사례를 갖고 있다. 해쉬함수의 표준화 과제는 1984년 디지탈서명 국제표준화 과제중 한 part로 시작했다가 1989년 독립된 과제가 되었다 그 당시에는 2개의 part(Part 1 : General. Part 2 : Hash-functions using an n-bit block cipher algorithm)로 시작되었다가 나중에 2개의 part (Part 3 : Dedicated hash-functions, Part 4 : Hash-functions using modular arithmetic)가 추가되었다. 이 과제는 1991년 CD(Committee Draft), 1992년 DIS(Draft for International Standard)가 되었고. 1993년에 IS(International Standard)가 되었고 1998년 1차 검토가 있을 예정이다.

  • PDF