• Title/Summary/Keyword: high data-rate system

검색결과 1,758건 처리시간 0.042초

Animal Tracking System Using the Doppler Effect for Single LEO Satellite (도플러 효과를 이용한 단일 저궤도위성의 동물추적시스템 개발)

  • Lee, Jeong-Nam;Jang, Yeong-Geun;Lee, Byeong-Hun;Mun, Byeong-Yeong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • 제34권11호
    • /
    • pp.61-69
    • /
    • 2006
  • Position determination accuracy is strongly depending on how much precisely and frequently satellite receiver measures transmitted signals from terminals on target animals when Doppler effect is applied for position determination. ARGOS satellite system has shown relatively high position determination accuracy by operating multiple satellites, which enable operator to get more Doppler shift data from terminals. In case of animal tracking mission with single satellite, however, it is difficult for the satellite receiver to receive transmitted signals from terminals frequently during short period that satellite passes over ground terminals. This is one of the main sources to decrease position accuracy on target animals. In this paper, the Doppler rate estimation is implemented to increase the number of Doppler shift data received by single satellite. It is proved that the relatively high position determination accuracy with increased number of estimated data can be obtained. We also suggest that the Doppler rate estimation is applicable for position determination system with single satellite.

Improvement in Viola-Jones method for Real-Time Face Recognition System (실시간 얼굴인식 시스템 구현을 위한 비올라존스 알고리즘 개선)

  • Hong, Young-Min;Lee, In-Sung;Park, Jong-Sun;Jo, Yong-Sung;Kim, Chang-Beom
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • 제61권1호
    • /
    • pp.143-147
    • /
    • 2012
  • The rapid growth of camera technology can provide various types of information which was not previously provided. Furthermore, IP camera which has rapid data transfer rate and high resolution particularly provide a lot of useful functions beyond the existing simple surveillance capabilities. We are developing Real-Time Face Recognition Access Control System based on the camera technology, and improvement of face detection and recognition algorithms are vitally needed to realize that system. In this paper, we proposes a method to improve the computing speed and detection rate by adding new features to the existing Viola-Jones detection algorithm.

Serially Concatenated Space-Time Code using Iterative Decoding of High Data Rate Wireless Communication (고속 무선 통신을 위한 반복 복호 직렬 연쇄 시.공간 부호)

  • 김웅곤;구본진;양하영;강창언;홍대식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제25권4A호
    • /
    • pp.519-527
    • /
    • 2000
  • This paper suggests and analyzes the Serially Concatenated Space-Time Code(SCSTC) with the possibility of a efficient high-speed transmission in a band limited channel. The suggested code has a structure that uses the interleaver to connect the space-time code as an inner code and the convolutional code as a outer code serially. This code keeps the advantage of high-speed transmission and also has the high BER performance. The performance of the suggested system is compared with the conventional bandwidth efficient trellis coded modulation, such as a Serially Concatenated Trellis Coded Modulation (SCTCM) and a Turbo-Trellis Coded Modulation(Turbo-TCM). The results show that the suggested system has a 2.8dB and 3dB better BER performance than SCTCM and Turbo-TCM respectively in case of the transmission rate 2b/s/Hz in fading channel.

  • PDF

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Design of AT-DMB Baseband Receiver SoC

  • Lee, Joo-Hyun;Kim, Hyuk;Kim, Jin-Kyu;Koo, Bon-Tae;Eum, Nak-Woong;Lee, Hyuck-Jae
    • ETRI Journal
    • /
    • 제31권6호
    • /
    • pp.795-802
    • /
    • 2009
  • This paper presents the design of an advanced terrestrial digital multimedia broadcasting (AT-DMB) baseband receiver SoC. The AT-DMB baseband is incorporated into a hierarchical modulation scheme consisting of high priority (HP) and low priority (LP) stream decoders. The advantages of the hierarchical modulation scheme are backward compatibility and an enhanced data rate. The structure of the HP stream is the same as that of the conventional T-DMB system; therefore, a conventional T-DMB service is possible by decoding multimedia data in an HP stream. An enhanced data rate can be achieved by using both HP and LP streams. In this paper, we also discuss a time deinterleaver that can deinterleave data for a time duration of 384 ms or 768 ms. The interleaving time duration is chosen using the LP symbol mapping scheme. Furthermore, instead of a Viterbi decoder, a turbo decoder is adopted as an inner error correction system to mitigate the performance degradation due to a smaller symbol distance in a hierarchically modulated LP symbol. The AT-DMB baseband receiver SoC is fabricated using 0.13 ${\mu}m$ technology and shows successful operation with a 50 mW power dissipation.

Interaction force analysis by peak value tracking in optical soliton transmission system (광 솔리톤 전송 시스템에 있어서 최대치 추적에 의한 상호 작용력 분석)

  • 변승우;송재원
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • 제33A권7호
    • /
    • pp.15-22
    • /
    • 1996
  • In the soliton transmission system for a long-length and high bit rate data transmission systme using the nonlinear/dispersive optical fibers, the improtant problem is the loss characteristics and is the limited transmission rate by interaction forces. In this paper, It is explained the reasons of moved time position for the soliton peak value due to interaction force sof adjacent solitons. And for the analysis of interaction force affection level in the losslessmedia, we define the percent parameter of error rate due to the interaction forces and propose the optimum time distance of adjacent solitons by peak value tracking methods. With the results, initial percent of error is approximately 50% when itme difference between adjacent solitons is 5 times of funddametnal soliton pulse width. And it is confirmed that maximum transmission length of th esolitons is approximately 38 times of fundamental soliton period, which the maximum allowable percoent of error is 50%.

  • PDF

Circuit Component Requirements for Energy Scavenging System (Energy Scavenging 시스템을 위한 회로의 특성)

  • Kang, Sung-Muk;Park, Kyung-Jin;Kim, Ho-Seong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • 제57권10호
    • /
    • pp.1790-1795
    • /
    • 2008
  • Energy scavenging is a technique that converts ambient energy, for example, vibration and light, to electrical energy in order to supply power to low power electronic devices such as ubiquitous sensors. In this paper, we propose an optimal operation condition of power delivery circuit and design strategy for energy scavenging system in which the generated power is order of microwatt and, consequently, efficient handling of power is critical. We also propose that high data transmission rate is more realistic optimal design objective rather than high energy efficiency. It is shown that disconnection of load from the storage capacitor right after data transmission reduces energy wasting and that optimal value of storage capacitor can be determined at this condition. The feasibility of our propose is proved by experiments and we believe that the proposed design strategy will promote the application of piezoelectric micropower generator to the ubiquitous sensor networks.

A VLSI Design of IDEA Cipher Algorithm Based On a Single Iterative Round Method (단일 라운드 프로세스 방식의 IDEA 암호 알고리즘의 하드웨어 설계)

  • 최영민;권용진
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(2)
    • /
    • pp.144-147
    • /
    • 2000
  • Data security is an important issue in today's computer networks. In order to construct a safe infra in the open communication network, a cryptography is necessarily applied to several communication application fields like a high-speed networking system supporting real-time operation. A cryptography which has already realized by a software is designed by using a hardware to improve a throughput. In this paper, we design hardware architecture of IDEA by using a single iterative round method to improve a encryption throughput. In addition, we intend to develop a hardware design methodology that a specific cryptography operate with high-speed. The hardware model is described in VHDL and synthesized by the Samsung KG 80 Library in the Synopsys development software tool. With a system clock frequency 20MHz, this hardware permits a data conversion rate of more than 116 Mbit/s.

  • PDF

Tool management system for factory automation (공장 자동화를 위한 공구관리 시스템)

  • 김동훈;김선호;이춘식
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1992년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 19-21 Oct. 1992
    • /
    • pp.348-352
    • /
    • 1992
  • At present, the manufacturing industry is in a process of great change of circumstances like meeting demands to involve a great variety of types and shorter product life and thus more flexible manufacturing. These changes cause the larger number of different tools and frequent tool changes, which lead to the considerable losses in productive time and the high amount of capital tied up in the tool area. In our country, for the most part, the individual tool are still being presetted according to a data sheet and the measured values are entered, output in a list manually or via punched tapes. This usually takes a considerable amount time and lead to a high error rate. This paper describes a computer controlled tool data management system combined with the bar code tool identification labeled on cutting tools.

  • PDF

EVALUATION OF PH CONTROL AGENTS INFLUENCING ON CORROSION OF CARBON STEEL IN SECONDARY WATER CHEMISTRY CONDITION OF PRESSURIZED WATER REACTOR

  • Rhee, In Hyoung;Jung, Hyunjun;Cho, Daechul
    • Nuclear Engineering and Technology
    • /
    • 제46권3호
    • /
    • pp.431-438
    • /
    • 2014
  • The effect of various pH agents on the corrosion behavior of carbon steel was investigated under a simulated secondary water chemistry condition of a pressurized water reactor (PWR) in a laboratory, and the steel's corrosion performance was compared with the field data obtained from Uljin NPP unit 2 reactor. All tests were carried out at temperatures of $50^{\circ}C-250^{\circ}C$and pH of 8.5 - 10. The pH at a given temperature was controlled by adding different agents. Laboratory data indicate that the corrosion rate of carbon steel decreased as the pH increased under the test conditions and the highest corrosion rate was measured at $150^{\circ}C$. This high corrosion rate may be related to high dissolution and instability of Fe oxide ($Fe_3O_4$) at $150^{\circ}C$. It was also found that an addition of ethanolamine (ETA) to ammonia was more effectivefor anticorrosion than ammonia alone, and that mixed treatment reduced 50% of iron or more at pHs of 9.5 or higher, especially in the steam generator (SG) and the moisture separator & re-heater (MSR).