• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.03 seconds

Design and Implementation of Flying-object Tracking Management System by using Radar Data (레이더 자료를 이용한 항적추적관리시스템 설계 및 구현)

  • Lee Moo-Eun;Ryu Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.175-182
    • /
    • 2006
  • Radars are used to detect the motion of the low flying enemy planes in the military. Radar-detected raw data are first processed and then inserted into the ground tactical C4I system. Next, these data we analyzed and broadcasted to the Shooter system in real time. But the accuracy of information and time spent on the displaying and graphical computation are dependent on the operator's capability. In this paper, we propose the Flying Object Tracking Management System that allows the displaying of the objects' trails in real time by using data received from the radars. We apply the coordinate system translation algorithm, existing communication protocol improvements with communication equipment, and signal and information computation process. Especially, radar signal duplication computation and synchronization algorithm is developed to display the objects' coordinates and thus we can improve the Tactical Air control system's reliability, efficiency, and easy-of-usage.

Implementation of Adaptive MCS in The IEEE 802.11ac/ad Wireless LAN (IEEE 802.11ac/ad 무선 LAN의 적응형 MCS 구현 연구)

  • Lee, Ha-cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1613-1621
    • /
    • 2015
  • This paper analyzes the rate adaptation scheme and suggests applicable strategy of the MCS(Modulation and Coding Scheme) for improving DCF throughput in the IEEE 802.11ad and 802.11ad wireless LAN. IEEE 802.11ac and 802.11ad wireless LAN provide MCS technique that dynamically adjusts modulation level and code rate to the time-varying channel conditions in order to obtain considerably high data rates. But these standards did not provide rate adaptation algorithm, so this paper surveyes rate adaptation algorithm and suggests MCS scheme applied to IEEE 802.11ac and 802.11ad wireless LAN. Specially A MAC(Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Blind Equalization with Arbitrary Decision Delay using One-Step Forward Prediction Error Filters (One-step 순방향 추정 오차 필터를 이용한 임의의 결정지연을 갖는 블라인드 등화)

  • Ahn, Kyung-seung;Baik, Heung-ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2C
    • /
    • pp.181-192
    • /
    • 2003
  • Blind equalization of communication channel is important because it does not need training signal, nor does it require a priori channel information. So, we can increase the bandwidth efficiency. The linear prediction error method is perhaps the most attractive in practice due to the insensitive to blind channel equalizer length mismatch as well as for its simple adaptive implementation. Unfortunately, the previous one-step prediction error method is known to be limited in arbitrary decision delay. In this paper, we propose method for fractionally spaced blind equalizer with arbitrary decision delay using one-step forward prediction error filter from second-order statistics of the received signals for SIMO channel. Our algorithm utilizes the forward prediction error as training signal and computes the best decision delay from all possible decision delay. Simulation results are presented to demonstrate the performance of our proposed algorithm.

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

Visualization of Calculated Flow Fields Using Methods of Computer Graphics (컴퓨터 그래픽을 이용한 유동의 가시화)

  • Soon-Hung Han;Kyung-Ho Lee;Kyu-Ock Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.29 no.4
    • /
    • pp.7-17
    • /
    • 1992
  • Developments in the emerging field of Computational Fluid Dynamics(CFD), which is made possible by the supercomputer technologies, introduce a new problem of analysing the massive amount of output produced. This problem is common to fields of computational science and engineering. Scientific visualization is to solve this problem by applying advanced technologies of computer graphics. Methods of scientific visualization are studded to visualize calculated flow fields. Different methods of scientific visualization has been surveyed, analysed and compared to select one method, iso-surface. Methods of constructing iso-surfaces from a 3-D data set have been studied. A new algorithm for constructing iso-surfaces has been developed. The algorithm can be classified as one of surface tiling methods. To develope a portable visualization system the international standard PHIGS PLUS and its implementation on X-Window system, PEX, have been selected as the development environment. A prototype of visualization system has been developed. The developed visualization system has been tried to visualize several well-known flow fields.

  • PDF

Interference Management by Vertical Beam Control Combined with Coordinated Pilot Assignment and Power Allocation in 3D Massive MIMO Systems

  • Zhang, Guomei;Wang, Bing;Li, Guobing;Xiang, Fei;lv, Gangming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2797-2820
    • /
    • 2015
  • In order to accommodate huge number of antennas in a limited antenna size, a large scale antenna array is expected to have a three dimensional (3D) array structure. By using the Active Antenna Systems (AAS), the weights of the antenna elements arranged vertically could be configured adaptively. Then, a degree of freedom (DOF) in the vertical plane is provided for system design. So the three-dimension MIMO (3D MIMO) could be realized to solve the actual implementation problem of the massive MIMO. However, in 3D massive MIMO systems, the pilot contamination problem studied in 2D massive MIMO systems and the inter-cell interference as well as inter-vertical sector interference in 3D MIMO systems with vertical sectorization exist simultaneously, when the number of antenna is not large enough. This paper investigates the interference management towards the above challenges in 3D massive MIMO systems. Here, vertical sectorization based on vertical beamforming is included in the concerned systems. Firstly, a cooperative joint vertical beams adjustment and pilot assignment scheme is developed to improve the channel estimation precision of the uplink with pilots being reused across the vertical sectors. Secondly, a downlink interference coordination scheme by jointly controlling weight vectors and power of vertical beams is proposed, where the estimated channel state information is used in the optimization modelling, and the performance loss induced by pilot contamination could be compensated in some degree. Simulation results show that the proposed joint optimization algorithm with controllable vertical beams' weight vectors outperforms the method combining downtilts adjustment and power allocation.

Implementation of Adaptive Navigation for NPCs in Computer Games (컴퓨터 게임의 NPC를 위한 적응적 경로 이동의 구현)

  • Kim, Eunsol;Kim, Hyeyeon;Yu, Kyeonah
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.222-228
    • /
    • 2016
  • Uniform navigation of NPCs in computer games is an important factor that can decrease the interest of game players. This problem is particularly noticeable in pathfinding when using a waypoint graph because the NPCs navigate using only predefined locations. In this paper we propose a method that enables adaptive navigations of NPCs by observing player movements. The proposed method involves modification of waypoints dynamically by observing the player's point designation and use of the modified waypoints for NPC's pathfinding. Also, we propose an algorithm to find the NPC-specific path by learning the landform preferences of players. We simulate the implemented algorithm in an RPG game made with Unity 4.0 and confirm that NPC navigations had more variety and improved according to player navigations.

Implementation of 3Dimension Cloth Animation based on Cloth Design System (의복 디자인 시스템을 이용한 웹 3차원 의복 애니메이션 구현)

  • Kim, Ju-Ri;Lee, Hae-Jung;Joung, Suck-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2157-2163
    • /
    • 2011
  • In this paper, we designed 2D, 2.5D cloth design system and a 3D cloth animation system. They make the 3D cloth animation possible by using coordinate points extracted from 2D and 2.5D cloth design system in order to realize a system that allows customers to wear clothes in the virtual space. To make natural draping, it uses for description the mesh creation and transformation algorithms, path extraction algorithm, warp algorithm, and brightness extraction and application algorithms. The coordinate points extracted here are received as text format data and inputted as clothing information in the cloth file. Moreover, the cloth file has a 2D pattern and is realized to be used in the 3D cloth animation system. The 3D cloth animation system generated in this way builds a web-based fashion mall using ISB (Internet Space Builder) and lets customers view the clothing animation on the web by adding the animation process to the simulation result.

The Design and Implementation of a Cleaning Algorithm using NAND-Type Flash Memory (NAND-플래시 메모리를 이용한 클리닝 알고리즘의 구현 및 설계)

  • Koo, Yong-Wan;Han, Dae-Man
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.105-112
    • /
    • 2006
  • This paper be composed to file system by making a new i_node structure which can decrease Write frequency because this's can improved the file system efficiency if reduced Write operation frequency of flash memory in respect of file system, i-node is designed to realize Cleaning policy of data in order to perform Write operation. This paper suggest Cleaning Algorithm for Write operation through a new i_node structure. In addition, this paper have mode the oldest data cleaned and the most recent data maintained longest as a result of experiment that the recent applied program and data tend to be implemented again through the concept of regional and time space which appears automatically when applied program is implemented. Through experiment and realization of the Flash file system, this paper proved the efficiency of NAND-type flash file system which is required in on Embedded system.

  • PDF