• Title/Summary/Keyword: code formula

Search Result 177, Processing Time 0.027 seconds

Design and Performance Analysis of a Noncoherent Code Tracking Loop for 3GPP MODEM (3GPP 모뎀용 동기 추적회로의 설계 및 성능 분석)

  • 양연실;박형래
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12A
    • /
    • pp.983-990
    • /
    • 2003
  • In this paper, a noncoherent code tracking loop is designed for 3GPP MODEM and its performance is analyzed in terms of steady-state jitter variance and transient response characteristics. An analytical closed-form formula for steady-state jitter variance is Int derived for AWGN environments as a general function of a pulse-shaping filter, timing offset, signal-to-interference ratio, and loop bandwidth, together with the analysis on the transient response characteristic of a tracking loop. Based on the analysis, the code tracking loop with variable loop bandwidth that is efficient for full digital H/W implementation is designed and its performance is compared with that of the code tracking loop with fixed loop bandwidth, along with the verification by computer simulations.

A Study on Quantitative Modeling for EPCIS Event Data (EPCIS Event 데이터 크기의 정량적 모델링에 관한 연구)

  • Lee, Chang-Ho;Jho, Yong-Chul
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.4
    • /
    • pp.221-228
    • /
    • 2009
  • Electronic Product Code Information Services(EPCIS) is an EPCglobal standard for sharing EPC related information between trading partners. EPCIS provides a new important capability to improve efficiency, security, and visibility in the global supply chain. EPCIS data are classified into two categories, master data (static data) and event data (dynamic data). Master data are static and constant for objects, for example, the name and code of product and the manufacturer, etc. Event data refer to things that happen dynamically with the passing of time, for example, the date of manufacture, the period and the route of circulation, the date of storage in warehouse, etc. There are four kinds of event data which are Object Event data, Aggregation Event data, Quantity Event data, and Transaction Event data. This thesis we propose an event-based data model for EPC Information Service repository in RFID based integrated logistics center. This data model can reduce the data volume and handle well all kinds of entity relationships. From the point of aspect of data quantity, we propose a formula model that can explain how many EPCIS events data are created per one business activity. Using this formula model, we can estimate the size of EPCIS events data of RFID based integrated logistics center for a one day under the assumed scenario.

Acquisition of Direct-Sequence Cellular Communication System for Code Division Mutlipie Access (부호 분할 다원 접속을 위한 직접 확산 셀룰라 통신 시스팀의 동기)

  • 전정식;한영열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.207-217
    • /
    • 1993
  • In this paper, knowing a priori probability of phase offset between transmitted codes and reference codes in the receiver, we construct the state diagram of acquisition process of the direct sequence spread-spectrum communication system using the expanding window search. The scannings are performed from the cell with higher probability code epoch synchronization to that with lower one. We expand window size from initial value by r times of its previous size in each search, construct the corresponding the state diagrams, and derive average synchronization time using the Markov process and Mason's gain formula. Average synchronization times versus number of search n and detection probability $P_d$ are calculated.

  • PDF

The Maximum Strength of Stainless Steel Rectangular Hollow Section Columns and Beam-Columns (스테인리스 각형강관기둥의 최대내력)

  • Lee, Myung Jae;Kim, Hee Dong
    • Journal of Korean Society of Steel Construction
    • /
    • v.17 no.1 s.74
    • /
    • pp.73-82
    • /
    • 2005
  • The objective of this study is to investigate the maximum strength of stainless steel rectangular hollow section columns and beam-columns by using numerical analysis. Stress-strain relationships are modeled based on coupon tests results, and their influences on the maximum strength of columns and beam-columns are discussed. The analysis results are compared with the formula for the limit state design code of steel structures. It is ascertained that the design code for the stainless steel is needed to use stainless steel for the members of architectural structures.

Design and Performance Analysis of Non-coherent Code Tracking Loops for HSDPA MODEM (HSDPA 모뎀용 동기추적회로의 설계 및 성능분석)

  • Yang, Yeon-Sil;Park, Hyung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.7 no.1
    • /
    • pp.6-13
    • /
    • 2003
  • In this paper, a non-coherent code tracking loop is designed for 3GPP HSDPA MODEM and its performance is analyzed in terms of steady-state jitter variance and transient response characteristics. Analytical closed-form formula for steady-state jitter variance is first derived for AWGN environments as a function of pulse-shaping filter, timing offset, signal-to-interference ratio, and loop bandwidth. Also obtained is the transient response characteristic of a tracking loop. Finally, the performance of the designed tracking loop is confirmed by computer simulations.

  • PDF

An Evaluation of Shear Strength of Plain HVFAC Concrete by Double Shear Test Method (2면전단시험법에 의한 무근 HVFAC 콘크리트의 전단강도 평가)

  • Lee, Hyung-Jib;Suh, Jeong-In;Yoo, Sung-Won
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.5 no.3
    • /
    • pp.261-266
    • /
    • 2017
  • In this study, to determine the shear properties, experiments on the shear behavior of plain concrete with the high volume fly ash cement by double shear test were performed. Test parameters are fly ash content and concrete compressive strength. Experimental results show the tendency that the shear strength similarly increases with an increase in the compressive strength as is generally known. The concrete shear strength formula proposed in the concrete structural design code of KCI shows a similar tendency to the experimental results, and It is expected that the shear strength of the high volume fly ash cement concrete can be applied with the formula given in the concrete structural design code of KCI. When considering the fly ash content ratio, the shear strength of high volume fly ash cement concrete according to fly ash conctent ratio shows as having a far greater correlation than if it is not considered to fly ash content ratio. So, even though existing code can be appliable for non consideration of the fly ash content ratio, we proposed a formula that is much more relevant than that of concrete structural design code of KCI.

Development of Design Program of Regeneratively Cooled Combustion Chamber (재생냉각 연소실 설계 프로그램 개발)

  • Cho, Won-Kook;Seol, Woo-Seok
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.32 no.3
    • /
    • pp.102-110
    • /
    • 2004
  • A design code validated against the thermal analysis results of CFD and published RTE code for a regeneratively cooled combustion chamber has been developed. The major function of the code is to predict the regenerative cooling performance and stress of the chamber wall. Adopted are the empirical correlation for the evaluation of the heat transfer coefficient of hot gas and coolant, and theoretical formula for the fin effect of the channel rib. The hot-gas-side wall temperature from the present code shows 100 K difference at most compared to RTE results. It shows less than 10 % difference for the heat flux thrall through the chamber wall and hot-gas-side convective heat transfer coefficient. The major cause of the wall temperature difference is due to the underestimation of the fin effect of the channel rib.

Lateral Load Distribution for Prestressed Concrete Girder Bridge (PSC 거더교의 하중횡분배에 관한 연구)

  • Park, Moon-Ho;Park, Jung- Hwal;Kim, Jin- Kyu
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.4 no.2
    • /
    • pp.157-166
    • /
    • 2001
  • The purpose of this study is to examine the accuracy of the code provisions on lateral load distribution factors of prestressed concrete girder bridges. Most designers in Korea use the lever method or lateral load distribution formula in the existing design codes. However, the methods do not account for the effect of bridge skew or direction of diaphragm. Therefore, this study analysed the prestressed concrete girder bridge with grillage model for various girder spacings, directions of diaphragms, span lengths, and skews, and compared the results with those of existing design code. It has been found that lateral load distribution factors were proportional to the girder spacing while they were not significantly affected by the change of span length, direction of diaphragm, and skew. For bending moments, lateral load distribution factors from the grillage analysis were 60%~68% of those from Korean bridge design code. Therefore, the code provisions result in very conservative design. For support reactions, however, lateral load distribution factors from the grillage analysis were slightly greater than those from Korean bridge design code. Therefore, the capacity of bearings of the bridge with a large skew should be determined by grillage analysis.

  • PDF

Analyzing Vulnerable Software Code Using Dynamic Taint and SMT Solver (동적오염분석과 SMT 해석기를 이용한 소프트웨어 보안 취약점 분석 연구)

  • Kim, Sungho;Park, Yongsu
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.257-262
    • /
    • 2015
  • As software grows more complex, it contains more bugs that are not recognized by developers. Attackers can then use exploitable bugs to penetrate systems or spread malicious code. As a representative method, attackers manipulated documents or multimedia files in order to make the software engage in unanticipated behavior. Recently, this method has gained frequent use in A.P.T. In this paper, an automatic analysis method to find software security bugs was proposed. This approach aimed at finding security bugs in the software which can arise from input data such as documents or multimedia. Through dynamic taint analysis, how input data propagation to vulnerable code occurred was tracked, and relevant instructions in relation to input data were found. Next, the relevant instructions were translated to a formula and vulnerable input data were found via the formula using an SMT solver. Using this approach, 6 vulnerable codes were found, and data were input to crash applications such as HWP and Gomplayer.

Spectral Efficiency of MC-CDMA (MC-CDMA 방식의 주파수 효율)

  • Han Hee-Goo;Oh Seong-Keun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.39-48
    • /
    • 2006
  • In this paper, we analyze the spectral efficiency of multicarrier-code division multiple access (MC-CDMA) scheme. First, we derive a generalized formula for the spectral efficiency according to the number of subcarriers involved in, code division multiplexing and the number of codes used (i.e., loading factor), under a given set of channel coefficients. Also, we derive a generalized formula for spectral efficiency of various reduced-complexity systems that divide the full sets of subcarriers into several groups of subcarriers for code division multiplexing. Then, through these derivations, we establish an inter-relationship between the frequency selectivity and diversity order according to the number of multipaths. From the results, we choose the smallest code length while maximizing the diversity effect, provide an optimum subcarrier allocation strategy, and finally suggest a system structure for capacity-maximizing under the smallest code length. Through numerical analyses under simulated environments, we analyze the properties of spectral efficiency of various systems with reduced complexity and choose a major contributing factors to system design and a better system design methodology. Finally, we compare the spectral efficiency of the MC-CDMA scheme and orthogonal frequency division multiplexing (OFDM) scheme to make a relationship between both schemes.