• 제목/요약/키워드: almost convergence

검색결과 408건 처리시간 0.026초

결정궤환방식을 이용한 반향제거에 관한 연구 (A Study on the Echo Cancellation using the Decision Feedback)

  • 강석흠;이명수;강창언
    • 한국통신학회논문지
    • /
    • 제13권3호
    • /
    • pp.193-203
    • /
    • 1988
  • 본 논문에서는 ISDN U-인터페이스에서 결정 궤환을 이용한 반향 제거기를 제시하고 추정 반복 알고리즘을 사용하여 다른 선형 반향 제거기와 성능을 비교 분석하였다. 결정 궤환-반향 제거기는 다른 선형 반향 제저기에 비해 정상 상태의 평균 자승 오차가 감소하였다. 동일한 수렴 조건에서 반향 제저기의 성능은 채널 특성에 관계없이 거의 동일했다.

  • PDF

Nonlinearity Detection and Compensation in Radio over Fiber Systems Using a Monitoring Channel

  • Kim, Sung-Man
    • Journal of information and communication convergence engineering
    • /
    • 제13권3호
    • /
    • pp.167-171
    • /
    • 2015
  • A radio over fiber (RoF) system is a kind of analog optical transmission system and considered as a strong candidate for the next-generation fronthaul link in the future mobile network. In RoF systems, nonlinearity compensation is essential to increase the link capacity. In this paper, we propose a nonlinearity detection and compensation scheme using a monitoring channel in RoF systems. A monitoring channel is added at the transmitter site and used for transmitting a reference signal in an RoF transmission. The nonlinearity in the RoF transmission is detected by comparing the received monitoring signal and the original reference signal at the receiver site. Finally, the nonlinearity is compensated at the receiver by giving the reverse function of the detected nonlinearity. Our results show that the proposed scheme can almost remove the error vector magnitude degradation induced by the nonlinearity in the RoF system.

Initial Slot-Count Selection Scheme with Tag Number Estimation in Gen-2 RFID System

  • Lim, In-Taek;Ryu, Young-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제8권5호
    • /
    • pp.519-523
    • /
    • 2010
  • In Gen-2 RFID system, the initial value of $Q_{fp}$, which is the slot-count parameter of Q-algorithm, is not defined in the standard. In this case, if the number of tags within the reader's identification range is small and we let the initial $Q_{fp}$ be large, the number of empty slot will be large. On the other hand, if we let the initial $Q_{fp}$ be small in spite of many tags, almost all the slots will be collided. As a result, the performance will be declined because the frame size does not converge to the optimal point quickly during the query round. In this paper, we propose a scheme to allocate the optimal initial $Q_{fp}$ through the tag number estimation before the query round begins. Through computer simulations, it is demonstrated that the proposed scheme achieves more stable performance than Gen-2 Q-algorithm.

A Scheme for Estimating Number of Tags in FSA-based RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.164-169
    • /
    • 2009
  • An RFID system consists of radio frequency tags attached to objects that need to be identified and one or more electromagnetic readers. Unlike the traditional bar code system, the great benefit of RFID technology is that it allows information to be read without requiring contact between the tag and the reader. For this contact-less feature, RFID technology in the near future will become an attractive alternative to bar code in many application fields. In almost all the 13.56MHz RFID systems, FSA (Framed Slot ALOHA) algorithm is used for identifying multiple tags in the reader's identification range. In FSA algorithm, the tag identification time and system efficiency depend mainly on the number of tags and frame size. In this paper, we propose a tag number estimation scheme and a dynamic frame size allocation scheme based on the estimated number of tags.

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제5권4호
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

A Deep Learning Approach for Classification of Cloud Image Patches on Small Datasets

  • Phung, Van Hiep;Rhee, Eun Joo
    • Journal of information and communication convergence engineering
    • /
    • 제16권3호
    • /
    • pp.173-178
    • /
    • 2018
  • Accurate classification of cloud images is a challenging task. Almost all the existing methods rely on hand-crafted feature extraction. Their limitation is low discriminative power. In the recent years, deep learning with convolution neural networks (CNNs), which can auto extract features, has achieved promising results in many computer vision and image understanding fields. However, deep learning approaches usually need large datasets. This paper proposes a deep learning approach for classification of cloud image patches on small datasets. First, we design a suitable deep learning model for small datasets using a CNN, and then we apply data augmentation and dropout regularization techniques to increase the generalization of the model. The experiments for the proposed approach were performed on SWIMCAT small dataset with k-fold cross-validation. The experimental results demonstrated perfect classification accuracy for most classes on every fold, and confirmed both the high accuracy and the robustness of the proposed model.

MHP: Master-Handoff Protocol for Fast and Energy-Efficient Data Transfer over SPI in Wireless Sensing Systems

  • Yoo, Seung-Mok;Chou, Pai H.
    • ETRI Journal
    • /
    • 제34권4호
    • /
    • pp.553-563
    • /
    • 2012
  • Serial peripheral interface (SPI) has been identified as a bottleneck in many wireless sensing systems today. SPI is used almost universally as the physical connection between the microcontroller unit (MCU) and radios, storage devices, and many types of sensors. Virtually all wireless sensor nodes today perform up to twice as many bus transactions as necessary to transfer a given piece of data, as an MCU must serve as the bus master in all transactions. To eliminate this bottleneck, we propose the master-handoff protocol. After the MCU initiates reading from the source slave device and writing to the sink slave device, the MCU as a master becomes a slave, and either the source or the sink slave becomes the temporary master. Experiment results show that this master-handoff technique not only cuts the data transfer time in half, but, more importantly, also enables a superlinear energy reduction.

A four-node degenerated shell element with drilling degrees of freedom

  • Kim, Ji-Hun;Lee, Byung-Chai
    • Structural Engineering and Mechanics
    • /
    • 제6권8호
    • /
    • pp.921-937
    • /
    • 1998
  • A new four-node degenerated shell element with drilling degrees of freedom (DOF) is proposed. Allman-type displacement approximation is incorporated into the formulation of degenerated shell elements. The approximation improves in-plane performance and eliminates singularities of system matrices resulted from DOF deficiency. Transverse shear locking is circumvented by introducing assumed covariant shear strains. Two kinds of penalty energy are considered in the formulation for the purpose of suppressing spurious modes and representing true drilling rotations. The proposed element can be applied to almost all kinds of shell problems including composite laminated shell structures and folded shell structures. Numerical examples show that the element is of good accuracy and of reasonably fast convergence rate.

시간지연시스템의 안정성에 관한 연구동향 (Stability on Time Delay Systems: A Survey)

  • 박부견;이원일;이석영
    • 제어로봇시스템학회논문지
    • /
    • 제20권3호
    • /
    • pp.289-297
    • /
    • 2014
  • This article surveys the control theoretic study on time delay systems. Since time delay systems are infinite dimensional, there are not analytic but numerical solutions on almost analysis and synthesis problems, which implies that there are a tremendous number of approximated solutions. To show how to find such solutions, several results are summarized in terms of two different axes: 1) theoretic tools like integral inequality associated with the derivative of delay terms, Jensen inequality, lower bound lemma for reciprocal convexity, and Wirtinger-based inequality and 2) various candidates for Laypunov-Krasovskii functionals.

HYBRID DIFFERENCE SCHEMES FOR A SYSTEM OF SINGULARLY PERTURBED CONVECTION-DIFFUSION EQUATIONS

  • Priyadharshini, R.Mythili;Ramanujam, N.;Tamilselvan, A.
    • Journal of applied mathematics & informatics
    • /
    • 제27권5_6호
    • /
    • pp.1001-1015
    • /
    • 2009
  • In this paper, two hybrid difference schemes on the Shishkin mesh are constructed for solving a weakly coupled system of two singularly perturbed convection-diffusion second order ordinary differential equations with a small parameter multiplying the highest derivative. We prove that the schemes are almost second order convergence in the supremum norm independent of the diffusion parameter. Error bounds for the numerical solution and its derivative are established. Numerical results are provided to illustrate the theoretical results.

  • PDF