• Title/Summary/Keyword: scheme

Search Result 29,238, Processing Time 0.041 seconds

A New Hybird Control Scheme Using Active-Clamped Class-E Inverter with Induction Heating Jar for High Power Applications

  • Lee, Dong-Yun;Hyun, Dong-Seok
    • Journal of Power Electronics
    • /
    • v.2 no.2
    • /
    • pp.104-111
    • /
    • 2002
  • This paper presents a new hybrid control scheme using Active-Clamped Class-E(ACCE) inverter for the Induction Heating (IH) jar. The proposed hybrid control scheme has characteristics, which acts as class-E inverter at lower switch voltage and ACCE inverter at higher switch voltage than reference voltage of the main switch by feeding back voltage of the switch. The proposedv hybrid control scheme also has advantage of conventional ACCE inverter such as Zero-Voltage-Switch(ZVS) of the main switch and the reduced switch voltage due to clamping cricuit. Moreover, the proposed hybrid control method using ACCE inverter has higher output power than convenional control scheme since ACCE inverter operates like class-E inverter at low input voltage condition. The principles of the proposed control are explained in detail and the validity of the proposed control scheme is verifed through the several interesting simulated and experimental results.

Similarity Measurement Using Open-Ball Scheme for 2D Patterns in Comparison with Moment Invariant Method (Open-Ball Scheme을 이용한 2D 패턴의 상대적 닮음 정도 측정의 Moment Invariant Method와의 비교)

  • Kim, Seong-Su
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.1
    • /
    • pp.76-81
    • /
    • 1999
  • The degree of relative similarity between 2D patterns is obtained using Open-Ball Scheme. Open-Ball Scheme employs a method of transforming the geometrical information on 3D objects or 2D patterns into the features to measure the relative similarity for object(patten) recognition, with invariance on scale, rotation, and translation. The feature of an object is used to obtain the relative similarity and mapped into [0, 1] the interval of real line. For decades, Moment-Invariant Method has been used as one of the excellent methods for pattern classification and object recognition. Open-Ball Scheme uses the geometrical structure of patterns while Moment Invariant Method uses the statistical characteristics. Open-Ball Scheme is compared to Moment Invariant Method with respect to the way that it interprets two-dimensional patten classification, especially the paradigms are compared by the degree of closeness to human's intuitive understanding. Finally the effectiveness of the proposed Open-Ball Scheme is illustrated through simulations.

  • PDF

A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking

  • Zhang, Jinquan;Han, Bin
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.271-287
    • /
    • 2019
  • The synchronization scheme based on moving average is robust and suitable for the same rule to be adopted in embedding watermark and synchronization code, but the imperceptibility and search efficiency is seldom reported. The study aims to improve the original scheme for robust audio watermarking. Firstly, the survival of the algorithm from desynchronization attacks is improved. Secondly, the scheme is improved in inaudibility. Objective difference grade (ODG) of the marked audio is significantly changed. Thirdly, the imperceptibility of the scheme is analyzed and the derived result is close to experimental result. Fourthly, the selection of parameters is optimized based on experimental data. Fifthly, the search efficiency of the scheme is compared with those of other synchronization code schemes. The experimental results show that the proposed watermarking scheme allows the high audio quality and is robust to common attacks such as additive white Gaussian noise, requantization, resampling, low-pass filtering, random cropping, MP3 compression, jitter attack, and time scale modification. Moreover, the algorithm has the high search efficiency and low false alarm rate.

A NONLINEAR CONVEX SPLITTING FOURIER SPECTRAL SCHEME FOR THE CAHN-HILLIARD EQUATION WITH A LOGARITHMIC FREE ENERGY

  • Kim, Junseok;Lee, Hyun Geun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.1
    • /
    • pp.265-276
    • /
    • 2019
  • For a simple implementation, a linear convex splitting scheme was coupled with the Fourier spectral method for the Cahn-Hilliard equation with a logarithmic free energy. However, an inappropriate value of the splitting parameter of the linear scheme may lead to incorrect morphologies in the phase separation process. In order to overcome this problem, we present a nonlinear convex splitting Fourier spectral scheme for the Cahn-Hilliard equation with a logarithmic free energy, which is an appropriate extension of Eyre's idea of convex-concave decomposition of the energy functional. Using the nonlinear scheme, we derive a useful formula for the relation between the gradient energy coefficient and the thickness of the interfacial layer. And we present numerical simulations showing the different evolution of the solution using the linear and nonlinear schemes. The numerical results demonstrate that the nonlinear scheme is more accurate than the linear one.

Simple Power Allocation Scheme for Data Rate Fairness in NOMA Systems (비직교 다중 접속 시스템에서 전송률 공정성을 위한 단순한 전력 할당 기법)

  • Lee, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1241-1244
    • /
    • 2020
  • In this paper, we consider a downlink non-orthogonal multiple access system with a base station and N mobile stations, where we assume that instantaneous channel state information (CSI) is available at the base station. A power allocation scheme is proposed to achieve perfect fairness, which means equal data rates for all mobile stations. However, the power allocation scheme using full CSI requires high complexity. Hence, a simple power allocation scheme with low complexity is proposed by using high signal-to-noise power ratio (SNR) approximation. The simple power allocation scheme can achieve perfect fairness only for high SNR. However, it needs only the best CSI and the simple procedure to obtain power allocation coefficients. From simulation results, we show that the simple power allocation scheme provides remarkable fairness performance at high SNR.

A New Flash-aware Buffering Scheme Supporting Virtual Page Flushing

  • Lim, Seong-Chae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.161-170
    • /
    • 2022
  • Recently, NAND-type flash memory has been regarded to be new promising storage media for large-scale database systems. For flash memory to be employed for that purpose, we need to reduce its expensive update cost caused by the inablity of in-place updates. To remedy such a drawback in flash memory, we propose a new flash-aware buffering scheme that enables virtual flushing of dirty pages. To this end, we slightly alter the tradional algorithms used for the logging scheme and buffer management scheme. By using the mechanism of virtual flushing, our proposed buffering scheme can efficiently prevent the frequenct occureces of page updates in flash storage. Besides the advantage of reduced page updates, the proposed viurtual flushing mechanism works favorably for shorneing a recocery time in the presense of failure. This is because it can reduce the time for redo actions during a recovry process. Owing to those two benefits, we can say that our scheme couble be very profitable when it is incorporated into cutting-edge flash-based database systems.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Polar coded cooperative with Plotkin construction and quasi-uniform puncturing based on MIMO antennas in half duplex wireless relay network

  • Jiangli Zeng;Sanya Liu
    • ETRI Journal
    • /
    • v.46 no.2
    • /
    • pp.175-183
    • /
    • 2024
  • Recently, polar code has attracted the attention of many scholars and has been developed as a code technology in coded-cooperative communication. We propose a polar code scheme based on Plotkin structure and quasi-uniform punching (PC-QUP). Then we apply the PC-QUP to coded-cooperative scenario and built to a new coded-cooperative scheme, which is called PCC-QUP scheme. The coded-cooperative scheme based on polar code is studied on the aspects of codeword construction and performance optimization. Further, we apply the proposed schemes to space-time block coding (STBC) to explore the performance of the scheme. Monte Carlo simulation results show that the proposed cooperative PCC-QUP-STBC scheme can obtain a lower bit error ratio (BER) than its corresponding noncooperative scheme.