• Title/Summary/Keyword: software algorithms

Search Result 1,093, Processing Time 0.028 seconds

Servo Drives State of the Art in Industrial Applications - A Survey

  • Kennel R.;Kobs G.;Weber R.
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.321-325
    • /
    • 2001
  • Servo drives with microcomputer control provide the possibility of using modem and sophisticated control algorithms. As an additional feature it is possible to implement parallel and/or redundant software and hardware structures to realise safe motion or similar security functions. Unfortunately microcomputer control also has some impact on the behaviour of servo drives. Control algorithm, cycle time, sensors and interface have to be perfectly synchronised. Special control schemes are necessary on the line side (power supply) to meet the actual requirements concerning EMC. This contribution presents experiences and results obtained from a modem digital drive system pointing out the influences of low and high accuracy position sensors and the interdependencies mentioned above.

  • PDF

Improved Shamir's CRT-RSA Algorithm: Revisit with the Modulus Chaining Method

  • Lee, Seungkwang;Choi, Dooho;Choi, Yongje
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.469-478
    • /
    • 2014
  • RSA signature algorithms using the Chinese remainder theorem (CRT-RSA) are approximately four-times faster than straightforward implementations of an RSA cryptosystem. However, the CRT-RSA is known to be vulnerable to fault attacks; even one execution of the algorithm is sufficient to reveal the secret keys. Over the past few years, several countermeasures against CRT-RSA fault attacks have tended to involve additional exponentiations or inversions, and in most cases, they are also vulnerable to new variants of fault attacks. In this paper, we review how Shamir's countermeasure can be broken by fault attacks and improve the countermeasure to prevent future fault attacks, with the added benefit of low additional costs. In our experiment, we use the side-channel analysis resistance framework system, a fault injection testing and verification system, which enables us to inject a fault into the right position, even to within $1{\mu}s$. We also explain how to find the exact timing of the target operation using an Atmega128 software board.

Feature-guided Convolution for Pencil Rendering

  • Yang, Hee-Kyung;Min, Kyung-Ha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1311-1328
    • /
    • 2011
  • We re-render a photographic image as a simulated pencil drawing using two independent line integral convolution (LIC) algorithms that express tone and feature lines. The LIC for tone is then applied in the same direction across the image, while the LIC for features is applied in pixels close to each feature line in the direction of that line. Features are extracted using the coherent line scheme. Changing the direction and range of the LICs allows a wide range of pencil drawing style to be mimicked. We tested our algorithm on diverse images and obtained encouraging results.

Development of Induction machine Diagnosis System using LabVIEW and PDA (LabVIEW 기반의 PDA를 이용한 기계 진단 시스템의 개발)

  • Son, Jong-Duk;Yang, Bo-Suk;Han, Tian;Ha, Jong-Yong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.05a
    • /
    • pp.945-948
    • /
    • 2005
  • Mobile computing devices are becoming increasingly prevalent in a huge range of physical area, offering a considerable market opportunity. The focus of this paper is on the development of a platform of fault diagnosis system integrating with personal digital assistant (PDA). An improvement of induction machine rotor fault diagnosis based on AI algorithms approach is presented. This network system consists of two parts; condition monitoring and fault diagnosis by using Artificial Intelligence algorithm. LabVIEW allows easy interaction between acquisition instrumentation and operators. Also it can easily integrate AI algorithm. This paper presents a development environment fur intelligent application for PDA. The introduced configuration is a LabVIEW application in PDA module toolkit which is LabVIEW software.

  • PDF

A Study on the Application of Fuzzy Neural Network for Troubleshooting of Injection Molding Problems (사출성형 문제해결을 위한 퍼지 신경망 적용에 관한 연구)

  • 강성남;허용정;조현찬
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.11
    • /
    • pp.83-88
    • /
    • 2002
  • In order to predict the moldability of a injection molded part, a simulation of filling is needed. Short shot is one of the most frequent troubles encountered during injection molding process. The adjustment of process conditions is the most economic way to troubleshoot the problematic short shot in cost and time since the mold doesn't need to be modified at all. But it is difficult to adjust the process conditions appropriately in no times since it requires an empirical knowledge of injection molding. In this paper, the intelligent CAE system synergistically combines fuzzy-neural network (FNN) for heuristic knowledge with CAE programs for analytical knowledge. To evaluate the intelligent algorithms, a cellular phone flip has been chosen as a finite element model and filling analyses have been performed with a commercial CAE software. As the results, the intelligent CAE system drastically reduces the troubleshooting time of short shot in comparison with the experts' conventional methodology which is similar to the golden section search algorithm.

Design Agent-Based Sensor Structure (Agent 기반의 센서 구조 설계)

  • 임선종;송준엽;김동훈;이승우;이안성;박경택;김선호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.572-575
    • /
    • 2004
  • Since the 1990s, the advancement of semiconductor technology has resulted in the development of microprocessor technology, auxiliary computer technology, and application technology such as intelligent algorithms (neural network, fuzzy, etc.). These based the development of intelligent machines. An agent is autonomous software that recognizes environment, exchanges knowledge with other agents and makes decisions. We designed agent-based sensor structure. For the purpose, first, it modeled the function of an intelligent machine. Second, it designed sensory function on the agent level.

  • PDF

Propagation Analysis Method in using 3D Ray Tracing Model in Wireless Cell Planning Software (무선망 설계툴에서 3 차원 광선 추적법을 이용한 전파해석 방법)

  • Shin, Young-Il;Jung, Hyun-Meen;Lee, Seong-Choon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.251-255
    • /
    • 2007
  • In this paper, propagation analysis method in using 3D Ray Tracing propagation model in wireless cell planning is proposed. Through 3D Ray Tracing model, we can predict the distribution of propagation loss of the received signal. For correct and a low complex analysis, Quad Tree and Pre-Ordering and Hash Function algorithms are included in 3D Ray Tracing algorithm. And 3D Ray Tracing model is embodied in CellTREK that is developed by KT and used to plan Wibro system analysis. In CellTREK, propagation analysis is performed and that result is represented in 3D viewer. In numerical results, it is showed that the proposed scheme outperforms Modified HATA model when comparing with measurement data.

  • PDF

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.

The Controlled Selection: Do Algorithms for Optimal Sampling Plan Exist?

  • Kim, Sun-Woong;Ryu, Jae-Bok;Yum, Joon-Keun
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2002.11a
    • /
    • pp.175-178
    • /
    • 2002
  • A number of controlled selection methods, which have some advantages for practical surveys in considering controls beyond stratification, have developed throughout the last half-century. With respect to the optimization of sampling plan, it is obvious that we may use optimal controlled selection in preference to satisfactory controlled selection. However, there are currently certain restrictions on the employment of optimal controlled selection. We present further research to improve an algorithm for optimal controlled selection and to develop standard software.

  • PDF

An Efficient Monitoring Method of a Network Protocol for Downloadable CAS

  • Jeong, Young-Ho;Kwon, Oh-Yung;Ahn, Chung-Hyun;Hong, Jin-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.32-35
    • /
    • 2010
  • This paper presents an efficient monitoring method of a network protocol for a downloadable conditional access system (DCAS) that can securely transmit conditional access software via a bi-directional communication channel. In order to guarantee a secure channel based on mutual authentication between a DCAS head end server and set-top boxes, DCAS messages are encrypted and digitally signed. Owing to applied cryptographic algorithms, it is impossible to get information from messages directly without additional processing. Through categorizing DCAS messages into several groups, the proposed monitoring method can efficiently parse and trace DCAS messages in real-time. In order to verify the stability and effectiveness of the proposed monitoring method, we implement a DCAS monitoring system capable of capturing and parsing all DCAS messages. The experimental results show that the proposed monitoring method is well designed.

  • PDF