• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.031 seconds

An Implementation of the Baseline Recognizer Using the Segmental K-means Algorithm for the Noisy Speech Recognition Using the Aurora DB (Aurora DB를 이용한 잡음 음성 인식실험을 위한 Segmental K-means 훈련 방식의 기반인식기의 구현)

  • Kim Hee-Keun;Chung Young-Joo
    • MALSORI
    • /
    • no.57
    • /
    • pp.113-122
    • /
    • 2006
  • Recently, many studies have been done for speech recognition in noisy environments. Particularly, the Aurora DB has been built as the common database for comparing the various feature extraction schemes. However, in general, the recognition models as well as the features have to be modified for effective noisy speech recognition. As the structure of the HTK is very complex, it is not easy to modify, the recognition engine. In this paper, we implemented a baseline recognizer based on the segmental K-means algorithm whose performance is comparable to the HTK in spite of the simplicity in its implementation.

  • PDF

Implementation of Smart car using Fuzzy Rules

  • Bae, Cheol-Soo;Kim, Hyon-Yul;Lee, Seung-Kyoo;Kim, Tae-Woo;Kang, Yong-Seok;Hwang, Sun-Ki
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.2
    • /
    • pp.81-88
    • /
    • 2012
  • Future vehicle must be both driver-friendly and able to adapt to changes in the road's conditions. The system is needed to adapt to both the driver and the circumstance for maximum convenience and safety. In order to solve these problems, this paper proposes an algorithm for developing smart vehicles. In this paper, it is simulated to compare the performance of a normal car with that of the algorithm-implemented vehicle in a potential accident. Through the computer simulation, it proved that the algorithm-implemented vehicle automatically adjusted the mirrors and seat for the maximum comfort and driver's awareness of the circumstance.

Implementation of Global Localization and Kidnap Recovery for Mobile Robot on Feature Map (표식 지도를 이용한 이동로봇의 광역 위치인식 및 kidnap recovery)

  • Lee, Jung-Suk;Lee, Kyoung-Min;Ahn, Sungh-Wan;Choi, Jin-Woo;Chung, Wan-Kyun
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.29-39
    • /
    • 2007
  • We present an implementation of particle filter algorithm for global localization and kidnap recovery of mobile robot. Firstly, we propose an algorithm for efficient particle initialization using sonar line features. And then, the average likelihood and entropy of normalized weights are used as a quality measure of pose estimation. Finally, we propose an active kidnap recovery by adding new particle set. New and independent particle set can be initialized by monitoring two quality measures. Added particle set can re-estimate the pose of kidnapped robot. Experimental results demonstrate the capability of our global localization and kidnap recovery algorithm.

  • PDF

A Study on the Application of Elliptic Curve Cryptography to EMV (타원 곡선 암호의 EMV 적용에 관한 연구)

  • Kim, Woong;Lim, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.269-271
    • /
    • 2005
  • EMV was formed in February 1999 by Europay International, MasterCard International and Visa International to manage, maintain and enhance the EMV Integrated Circuit Card Specifications for Payment Systems as technology advances and the implementation of chip card programs become more prevalent. The formation of EMV ensures that single terminal and card approval processes are developed at a level that will allow cross payment system interoperability through compliance with the EMV specifications. A credit card environment of the domestic market adopted the standard Local-EMV to have the compatibility with EMV international standard and the EMV migration have been carried out b,# the step-by-step process. It may be possible to adopt various kinds of cryptographic algorithms, however, RSA public key algorithm is currently used. In this paper, as a public key algorithm for the authentication process, Elliptic Curve Cryptographic algorithm is applied to the EMV process. Implementation results is shown. and the possible changes necessary to accommodate Elliptic Curve Cryrtography is proposed.

  • PDF

Remote Controller Design of Networked Control System using Genetic Algorithm (유전자 알고리즘을 이용한 네트워크 기반 제어 시스템의 원격 제어기 설계)

  • Kim, H. H.;Lee, K. C;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.598-601
    • /
    • 2001
  • As many sensors and actuators are used in many automated system, various industrial networks are adopted for digital control system. In order to take advantages of the networking, however, the network implementation should be carefully designed to satisfy real-time requirements considering network delays. This paper presents the implementation scheme of a networked control system via Profibus-DP network. More specifically, the effect of the network delay on the control performance was evaluated on a Profibus-DP testbed, and a GA based PID tuning algorithm is proposed to demonstrate the fesibility of the networked control system.

  • PDF

VLSI Implementation of High Speed Variable-Length RSA Crytosystem (가변길이 고속 RSA 암호시스템의 VLSI 구현)

  • 박진영;서영호;김동욱
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.285-288
    • /
    • 2002
  • In this paper, a new structure of 1024-bit high-speed RSA cryptosystem has been proposed and implemented in hardware to increase the operation speed and enhance the variable-length operation in the plain text. The proposed algorithm applied a radix-4 Booth algorithm and CSA(Carry Save Adder) to the Montgomery algorithm for modular multiplication As the results from implementation, the clock period was approached to one delay of a full adder and the operation speed was 150MHz. The total amount of hardware was about 195k gates. The cryptosystem operates as the effective length of the inputted modulus number, which makes variable length encryption rather than the fixed-length one. Therefore, a high-speed variable-length RSA cryptosystem could be implemented.

  • PDF

FPGA Implementation of a Cryptographic Accelerator for IPSec authentications

  • Lee, Kwang-Youb;Kwak, Jae-Chang
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.948-950
    • /
    • 2002
  • IPSec authentication provides support for data integrity and authentication of IP packets. Authentication is based on the use of a message authentication code(MAC). Hash function algorithm is used to produce MAC , which is referred to HMAC. In this paper, we propose a cryptographic accelerator using FPGA implementations. The accelator consists of a hash function mechanism based on MD5 algorithm, and a public-key generator based on a Elliptiv Curve algorithm with small scale of circuits. The accelator provides a messsage authentification as well as a digital signature. Implementation results show the proposed cryptographic accelerator can be applied to IPSec authentications.

  • PDF

Simulink Model Implementation of MVDR Adaptive Beamformer for GPS Anti-Jamming

  • Han, Jeongwoo;Park, Hoon;Kim, Bokki;Han, Jin-Hee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.2
    • /
    • pp.51-57
    • /
    • 2020
  • For the purpose of development of anti-jamming GPS receiver we have developed an anti-jamming algorithm and its Simulink implementation model. The algorithm used here is a form of Space-Time Adaptive Processing (STAP) filter which is well known as an effective way to remove wideband jamming signals. We have chosen Minimum Variance Distortionless Response (MVDR) block-adaptive beamforming algorithm for our development since it can provide relatively fast convergence speed to reach optimal weights, stable and high suppression capability on various types of jamming signals. We will show modeling results for this MVDR type adaptive beamformer and some simulation results. We also show the integrity of the demodulated satellite signals and the accuracy of resulting navigation solutions after anti-jamming operation.

Remote Controller Design of networked Control System Using Genetic Algorithm (유전자 알고리즘을 이용한 네트워크 기반 제어 시스템의 원격 제어기 설계)

  • Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.1
    • /
    • pp.80-88
    • /
    • 2002
  • As many sensors and actuators are used in automated systems, various industrial networks are adopted for digital control system. In order to take advantages of the networking, however, the network implementation should be carefully designed to satisfy real-time requirements considering network delays. This paper presents the implementation scheme of a networked control system via Profibus-DP network. More specifically, the effect of the network delay on the control performance was evaluated on a Profibus-DP testbed, and a GA-based PID tuning algorithm is proposed to design controllers suitable for networked control systems.

Implementation of PID controller for DC-DC converter using microcontroller (마이크로컨트롤러를 이용한 DC-DC 변환의 PID 제어기 설계)

  • Awouda, Ala Eldin Abdallah;Lee, Yong-Hui;Yi, Jae-Young;Yi, Cheon-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.83-86
    • /
    • 2002
  • This paper presents an implementation of Pill controller for DC-DC converter using the microcontroller. The features of the microcontroller such as the on chip ADC and Pulse width Modulator (PWM) eliminate the external components needed to perform these functions. The duty rate cycle for the DC-DC converter can be updated every time when the (ADC) conversation and the calculation time are finished. The stable response can be obtained for any kind of DC-DC converters. The SMPS controller looks at the converter output, compares the output to a set point, performs a control algorithm (Pill algorithm) and finally applies the algorithm output to the PWM. PWM output is then used to drive the DC-DC converter. Figure (1) shows a simplified block diagram of a complete DC-DC converter system.

  • PDF