• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.038 seconds

Implementation of Improved Functional Router Using Embedded Linux System (Subspace projection과 SCORE algorithm을 이용한 두 가지 전파방해 대응기술의 성능비교)

  • Han, Sang-Yoon;Shin, Jung-Hwan;Heo, Jun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.79-80
    • /
    • 2006
  • In this paper, we compare two different anti-jamming schemes, Subspace projection and SCORE algorithm. For multipath cancelation, nulling technique is applied to both anti-jamming schemes. It is noted that SCORE algorithm is more robust to the multipath interference. It is also noted that Subspace projection scheme requires nulling technique for multipath mitigation.

  • PDF

On A Symbolic Method for Error Estimation of a Mixed Interpolation

  • Thota, Srinivasarao
    • Kyungpook Mathematical Journal
    • /
    • v.58 no.3
    • /
    • pp.453-462
    • /
    • 2018
  • In this paper, we present a symbolic formulation of the error obtained due to an approximation of a given function by the mixed-interpolating function. Using the proposed symbolic method, we compute the error evaluation operator as well as the error estimation at any arbitrary point. We also present an algorithm to compute an approximation of a function by the mixed interpolation technique in terms of projector operator. Certain examples are presented to illustrate the proposed algorithm. Maple implementation of the proposed algorithm is discussed with sample computations.

Comparison of the Dynamic Time Warping Algorithm for Spoken Korean Isolated Digits Recognition (한국어 단독 숫자음 인식을 위한 DTW 알고리즘의 비교)

  • 홍진우;김순협
    • The Journal of the Acoustical Society of Korea
    • /
    • v.3 no.1
    • /
    • pp.25-35
    • /
    • 1984
  • This paper analysis the Dynamic Time Warping algorithms for time normalization of speech pattern and discusses the Dynamic Programming algorithm for spoken Korean isolated digits recognition. In the DP matching, feature vectors of the reference and test pattern are consisted of first three formant frequencies extracted by power spectrum density estimation algorithm of the ARMA model. The major differences in the various DTW algorithms include the global path constrains, the local continuity constraints on the path, and the distance weighting/normalization used to give the overall minimum distance. The performance criterias to evaluate these DP algorithms are memory requirement, speed of implementation, and recognition accuracy.

  • PDF

Implementation of an Over-Current Relaying Algorithm Using 80C196KC (80C196KC를 이용한 과전류 계전 알고리즘 구현)

  • Kim, Hyung-Kyu;Lee, Bong-Hyun;Kang, Sang-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.495-496
    • /
    • 2007
  • An Over Current Relayng algorithm using 80c196kc micro processor was realized in this paper. This OCR Algorithm was verified with simulated fault signal. The fault signal was made by EMTP and realized by DOBLE to compare H/W test with S/W test. This simulations showed similar result between H/W and S/W test.

  • PDF

Implementation of SHA-3 Algorithm Based On ARM-11 Processors (ARM-11 프로세서 상에서의 SHA-3 암호 알고리즘 구현 기술)

  • Kang, Myeong-mo;Lee, Hee-woong;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.749-757
    • /
    • 2015
  • As the smart era, the use of smart devices is increasing. Smart devices are widely used to provide a human convenience, but there is a risk that information is exposed. The smart devices to prevent this problem includes the encryption algorithm. Among them, The hash function is an encryption algorithm that is used essentially to carry out the algorithm, such as data integrity, authentication, signature. As the issue raised in the collision resistance of SHA-1 has recently been causing a safety problem, and SHA-1 hash function based on the current standard of SHA-2 would also be a problem in the near future safety. Accordingly, NIST selected KECCAK algorithm as SHA-3, it has become necessary to implement this in various environments for this algorithm. In this paper, implementation of KECCAK algorithm. And SHA-2 On The ARM-11 processor, and compare performance.

Comparison of Algorithm Performance in the Smart Card used as the TETRA terminal encryption module (TETRA 단말기용 스마트카드에서의 알고리즘 성능 비교)

  • Ahn Jae-Hwan;Park Yong-Seok;Jung Chang-Ho;Ahn Joung-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.183-186
    • /
    • 2006
  • It is studied the implementation possibility of some encryption algorithms which meet the performance requirements in the smart card used in the TETRA system End-to-End Encryption. It is measured the operation time of the algorithm in the smart card which has 32 bit smart card controller made by Samsung Electronics. The algorithms used in the performance comparison are AES, ARIA, 3DES, SEED, IDEA which are the domestic or international standards. The input and output time of the smart card are measured using the smart card protocol analyzer. The pure algorithm operation time is calculated by the repeated algorithm operations. This measurement results can be used as the criteria for the selection of algorithm which will be used in the TETRA End-to-End encryption system. The algorithm which has better performance can be used for the implementation of additional functions in the smart lard, because of the enough time margin.

  • PDF

A Study on Hybird Authentication Algorithm for Security Channel Retention (안전한 통신채널 확보를 위한 혼합형 인증알고리즘에 관한 연구)

  • Lee Seon-Keun;Kim Hwan-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.22-26
    • /
    • 2006
  • Symmetric cryptographic algorithm is incongruent in network environment by absence of authencation in spite of advantage of easy etc. on data processing and implementation of high speed. Therefore, proposed merging style authentication algorithm that use MAC and MDC so that symmetric cryptographic algorithm can achieve authentication. Proposed algorithm made security can wide of secure communication channel as to achieve authentication to cryptographic algerian itself not that act independently of symmetric cryptographic algorithm.

Performance Analysis of Viola & Jones Face Detection Algorithm (Viola & Jones 얼굴 검출 알고리즘의 성능 분석)

  • Oh, Jeong-su;Heo, Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.477-480
    • /
    • 2018
  • Viola and Jones object detection algorithm is a representative face detection algorithm. The algorithm uses Haar-like features for face expression and uses a cascade-Adaboost algorithm consisting of strong classifiers, a linear combination of weak classifiers for classification. This algorithm requires several parameter settings for its implementation and the set values affect its performance. This paper analyzes face detection performance according to the parameters set in the algorithm.

  • PDF

VLSI implementation of Usage Parameter Control Based on Cell Loss Priority (셀손실 우선순위 기반의 사용 변수제어의 VLSI 구현)

  • 권재우;조태경;최명렬
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.196-199
    • /
    • 2000
  • In this paper has studied an enhanced usage parameter control algorithm, which is one of the preventive traffic control method in ATM networks. The proposed algorithm is based on the CLP(Cell Loss Priority) bit in the ATM cell header. This algorithm can eliminate the measurement phasing problem in cell conformance testing in ATM networks. The proposed algorithm can minimize the cell loss ratio of high priority cell(CLP = 0) and resolve the burstiness of eel]s which may be generated in the multiplexing and demultiplexing procedure. For the performance evaluation, we have simulated the proposed algorithm with discrete time input traffic model and the results show that the performance of the proposed algorithm is better than that of ITU-T usage parameter control algorithm.

  • PDF

Implementation of MDCT for MP3 using ARM Processor (ARM 프로세서를 이용한 MP3 인코딩용 고속 MDCT 구현)

  • 조경연;최종찬;이철동
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.708-711
    • /
    • 1999
  • MDCT( Modified Discrete Cosine Transform ) is one of the most compute-intensive operations in the MPEG audio coding standard. In this paper a fast algorithm to perform MDCT operation is presented. The algorithm presented in the MPEG audio coding standard requires (N/2) $\times$ N multiplications and (N/2) $\times$ (N-1) additions to generate the result, but the algorithm presented in this paper requires (N/2) $\times$ (N/2) multiplications and (N/2) $\times$ (N/2) additions to perform the same task. In this algorithm N should be multiple of 4. The algorithm was implemented using ARM processor and the processing time comparison between the original algorithm and the fast algorithm is presented.

  • PDF