• 제목/요약/키워드: access timing

검색결과 127건 처리시간 0.027초

영상 Subtraction을 이용한 이동 물체 감시 시스템 (Moving Object Surveillance System based on Image Subtraction Technique)

  • 이승현;류충상
    • 한국안전학회지
    • /
    • 제12권3호
    • /
    • pp.60-66
    • /
    • 1997
  • In this paper, a moving object surveillance system, which can extract moving object in real-time, using image subtraction method is described. This technique based on the novelty filter having the structure of neural network associative memory. Digital arithmetic and timing control parts were composed of hardwired controller to treat two-dimensional massive image information. SRAMS having 20 ns access time were used for the image buffer that has high speed write/read property. Image extraction algorithm is discussed and supported by simulation and experiments.

  • PDF

Effect of Synchronization Errors on the Performance of Multicarrier CDMA Systems

  • Li Ying;Gui Xiang
    • Journal of Communications and Networks
    • /
    • 제8권1호
    • /
    • pp.38-48
    • /
    • 2006
  • A synchronous multicarrier (MC) code-division multiple access (CDMA) system using inverse fast Fourier transform (IFFT) and fast Fourier transform (FFT) for the downlink mobile communication system operating in a frequency selective Rayleigh fading channel is analyzed. Both carrier frequency offset and timing offset are considered in the analysis. Bit error rate performance of the system with both equal gain combining and maximum ratio combining are obtained. The performance is compared to that of the conventional system using correlation receiver. It is shown that when subcarrier number is large, the system using IFFT/FFT has nearly the same performance as the conventional one, while when the sub carrier number is small, the system using IFFT/FFT will suffer slightly worse performance in the presence of carrier frequency offset.

무선 LAN MAC 계층 설계 및 구현 (Design and Implementation of MAC Protocol for Wireless LAN)

  • 김용권;기장근;조현묵
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(1)
    • /
    • pp.253-256
    • /
    • 2001
  • This paper describes a high speed MAC(Media Access Control) function chip for IEEE 802.11 MAC layer protocol. The MAC chip has control registers and interrupt scheme for interface with CPU and deals with transmission/reception of data as a unit of frame. The developed MAC chip is composed of protocol control block, transmission block, and reception block which supports the BCF function in IEEE 802.11 specification. The test suite which is adopted in order to verify operation of the MAC chip includes various functions, such as RTS-CTS frame exchange procedure, correct IFS(Inter Frame Space)timing, access procedure, random backoff procedure, retransmission procedure, fragmented frame transmission/reception procedure, duplicate reception frame detection, NAV(Network Allocation Vector), reception error processing, broadcast frame transmission/reception procedure, beacon frame transmission/reception procedure, and transmission/reception FIEO operation. By using this technique, it is possible to reduce the load of CPU and firmware size in high speed wireless LAN system.

  • PDF

Impact of Energy and Access Methods on Extrahepatic Tumor Spreading and the Ablation Zone: An Ex vivo Experiment Using a Subcapsular Tumor Model

  • Jin Sil Kim;Youngsun Ko;Hyeyoung Kwon;Minjeong Kim;Jeong Kyong Lee
    • Korean Journal of Radiology
    • /
    • 제20권4호
    • /
    • pp.580-588
    • /
    • 2019
  • Objective: To evaluate the impact of energy and access methods on extrahepatic tumor spreading and the ablation zone in an ex vivo subcapsular tumor mimic model with a risk of extrahepatic tumor spreading. Materials and Methods: Forty-two tumor-mimics were created in bovine liver blocks by injecting a mixture of iodine contrast material just below the liver capsule. Radiofrequency (RF) ablations were performed using an electrode placed parallel or perpendicular to hepatic surface through the tumor mimic with low- and high-power protocols (groups 1 and 2, respectively). Computed tomography (CT) scans were performed before and after ablation. The presence of contrast leak on the hepatic surface on CT, size of ablation zone, and timing of the first roll-off and popping sound were compared between the groups. Results: With parallel access, one contrast leak in group 1 (1/10, 10%) and nine in group 2 (9/10, 90%) (p < 0.001) were identified on post-ablation CT. With perpendicular access, six contrast leaks were identified in each group (6/11, 54.5%). The first roll-off and popping sound were significantly delayed in group 1 irrespective of the access method (p = 0.002). No statistical difference in the size of the ablation zone of the liver specimen was observed between the two groups (p = 0.247). Conclusion: Low-power RF ablation with parallel access is proposed to be effective and safe from extrahepatic tumor spreading in RF ablation of a solid hepatic tumor in the subcapsular location. Perpendicular placement of an electrode to the capsule is associated with a risk of extrahepatic tumor spreading regardless of the power applied.

H.264 Encoder용 Direct Memory Access (DMA) 제어기 설계 (A Design of Direct Memory Access (DMA) Controller For H.264 Encoder)

  • 송인근
    • 한국정보통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.445-452
    • /
    • 2010
  • 본 논문에서는 Full 하드웨어 기반 베이스라인 프로파일 레벨 3 규격 H.264 인코더 코덱에서 사용할 수 있는 Direct Memory Access (DMA) 제어기를 설계하였다. 설계한 모듈은 CMOS Image Sensor(CIS)로부터 영상을 입력 받아 메모리에 저장한 후 인코더 코덱 모듈의 동작에 맞춰 원영상과 참조영상을 각각 한 매크로블록씩 메모리로부터 읽어서 공급하거나 저장하며, DMA 제어기의 한 매크로블록씩 처리하는데 478 cycle을 소요한다. 설계한 구조를 검증하기 위해 JM 9.4와 호환되는 Reference Encoder C를 개발하였으며, Encoder C로부터 Test Vector를 추출하여 설계한 회로를 검증하였다. 제안한 DMAC 제어기의 Cycle은 Xilinx MIG를 사용한 Cycle 보다 40%의 감소를 나타내었다.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

동기식 디지털 이중화 시스템을 위한 그룹핑 기법 (A Grouping Technique for Synchronous Digital Duplexing Systems)

  • 고요한;박창환;박경원;전원기;백종호;이석필;조용수
    • 한국통신학회논문지
    • /
    • 제34권4C호
    • /
    • pp.341-348
    • /
    • 2009
  • 본 논문에서는 OFDMA(Orthogonal Frequency Division Multiple Access) 기반 동기식 디지털 이중화(Synchronous Digital Duplexing) 방식에 적합한 그룹핑 기법을 제안한다. SDD 방식은 상호 레인징(mutual ranging) 과정을 통해 획득한 상호 시간 정보와 상호 채널 정보를 이용하여 상 하향링크 신호를 동시에 전송 가능하기 때문에 자원 할당의 유연성과 데이터 전송 효율이 증가하는 장점을 갖는다. 그러나 AP(access point)와 각 SS(subscriber station), SS와 다른 SS 사이의 상호 시간 지연과 상호 채널 길이의 합이 CP(cyclic prefix) 길이보다 긴 경우에는 OFDMA 심볼의 직교성을 유지하기 위해 추가의 CS(cyclic suffix)를 삽입해야하는 단점이 있다. 본 논문에서는 SDD 방식에서 추가의 CS가 필요한 경우에 CS 길이를 최소화하기 위하여 셀 내에 존재하는 AP 혹은 SS를 그룹으로 구분하여 송수신 시간을 제어하는 그룹핑 기법을 제안하며, 모의실험을 통해 성능을 비교 분석한다.

가상주소 변환 과정에 대한 부담의 줄임 (Peducing the Overhead of Virtual Address Translation Process)

  • 우종정
    • 한국정보처리학회논문지
    • /
    • 제3권1호
    • /
    • pp.118-126
    • /
    • 1996
  • 메모리의 계층적 구조는 메모리의 접근 속도를 개선하고 프로그래밍 공간을 확장 하는데 유용한 메카니즘이다. 그러나 이 구조는 데이타의 참조를 위해서 적어도 두번- 주소 변환을 위한 TLB 와 원하는 데이타를 위한 데이타 캐시-의 메모리 접근이 필요하다. 만약 캐시의 크기가 가상 메모리의 페이지 크기와 캐시 메모리의 연관 정도의 곱보다 커지면 TLB접근과 데이타 캐시의 접근을 병렬로 수행하기 어려우며, 따라서 프로세서 타이밍의 임계 경로가 길어져 성능에 영향을 미친다. 이들의 병렬 접근을 성취하기 위하여 직접 사상 TLB와 조그마한 완전 연관 사상 TLB를 결합하나 혼합 사상 TLB를 제 안한다. 전자는 TLB 접근에 따른 지연시간을 줄 일 수 있으며 후자는 전자로부터 발생한 충돌 부재를 제거할 수 있게 된다. 트레이스 구동 모의 실험 결과에 의하면 제안된 TLB 는 4개의 엔트리로만 구성된 완전사상 TLB를 추가하더라도 부재율의 상승에 의한 영향이 주소변환에 따른 지연시간 축소에 위하여 상쇄되므로 효과적이다.

  • PDF

무선 센서 네트워크에서 에너지 효율성을 고려한 시간 동기 알고리즘 (EETS : Energy- Efficient Time Synchronization for Wireless Sensor Networks)

  • 김수중;홍성화;엄두섭
    • 전기전자학회논문지
    • /
    • 제11권4호
    • /
    • pp.322-330
    • /
    • 2007
  • Recent advances in wireless networks and low-cost, low-power design have led to active research in large-scale networks of small, wireless, low power sensors and actuators, In large-scale networks, lots of timing-synchronization protocols already exist (such as NTP, GPS), In ad-hoc networks, especially wireless sensor networks, it is hard to synchronize all nodes in networks because it has no infrastructure. In addition, sensor nodes have low-power CPU (it cannot perform the complex computation), low batteries, and even they have to have active and inactive section by periods. Therefore, new approach to time synchronization is needed for wireless sensor networks, In this paper, I propose Energy-Efficient Time Synchronization (EETS) protocol providing network-wide time synchronization in wireless sensor networks, The algorithm is organized two phase, In first phase, I make a hierarchical tree with sensor nodes by broadcasting "Level Discovery" packet. In second phase, I synchronize them by exchanging time stamp packets, And I also consider send time, access time and propagation time. I have shown the performance of EETS comparing Timing-sync Protocol for Sensor Networks (TPSN) and Reference Broadcast Synchronization (RBS) about energy efficiency and time synchronization accuracy using NESLsim.

  • PDF

A Performance Index for Time Slot Allocation in Link-16 Relative Navigation System

  • Lee, Jin Hyuk;Lee, Ju Hyun;Noh, Jae Hee;Lim, Deok Won;Park, Chansik;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제6권3호
    • /
    • pp.117-123
    • /
    • 2017
  • In this paper, we propose a performance index that can compare the position estimation performance according to the time slot allocation order, which is superior in the position estimation performance in the operation of the Link-16 based relative navigation system. In order to verify the validity of the performance index, a software-based Link-16 relative navigation system performance analysis platform composed of a signal generator, a signal reception and navigation algorithm execution unit, and a performance analysis unit was designed. Using the designed software platform, we analyzed the relationship between proposed performance index and position estimation performance according to time slot allocation order in the same position reference (PR) arrangement. The performance index of the proposed time slot allocation is expected to be utilized not only for the Link-16 system, but also for the Time Division Multiple Access (TDMA)-based navigation system.