• Title/Summary/Keyword: 구성 시뮬레이션

Search Result 4,511, Processing Time 0.032 seconds

Minimizing non-optimal paths in multi-hop ad hoc network adopted IEEE 802.11 PSM (IEEE 802.11 PSM을 적용한 다중 홉애드 혹 네트워크에서 우회경로의 최소화)

  • Whang, Do-Hyeon;Lee, Jang-Su;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.583-588
    • /
    • 2007
  • It is easy to implement a temporary network with a mobile ad-hoc network in which mobile nodes have without using a infrastructure network. They depend on their limited power. Recently, it is a hot issue to save the energy in a mobile ad-hoc network because a mobile nodes have a limited energy. Research of IEEE 802.11 PSM was proposed in a single hop ad-hoc assumption. If IEEE 802.11 PSM is applied to multi hop ad-hoc network, non-optimal paths will be generated by the mobile nodes which didn't receive a message of routing request. Non-optimal paths increase not only a network latency but also energy consumption of mobile nodes. Reconfiguring algorithm of non-optimal paths caused by the mobile nodes which didn't receive a message of routing request is proposed in this paper. A mobile node can overhear the data in his range. A wireless medium is shared by all mobile nodes using the same bandwidth. All mobile nodes lookout the non-optimal paths with these properties of a medium, if non-optimal path is generated, optimal reconfiguring will be accomplished by modifying routing table of itself or sending a request message of routing update to nearby nodes. By reconfiguring the non-optimal paths to optimized ones, network latency and energy consumption was decreased. It is confirmed to ignore the overhead caused by a algorithm presented in this paper through the result of the simulation.

The Error Diffusion halftoning Method Using Information of Edge Enhancement (에지 강조 정보를 이용한 오차확산 해프토닝)

  • Kwak Nae Joung;Ahn Jae Hyeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.3 s.303
    • /
    • pp.107-114
    • /
    • 2005
  • Edge enhanced image is needed for processing images for special purpose such as a circuit diagram or a design composed of lines. Error diffusion halftoning, among digital halftoning methods to represent a continuous grayscale image for the binary output device such as printers, facsimiles, LCD televisions and etc. also makes edges of objects blurred. This paper proposes the method to enhance the edge of a binary image for the binary output device as well as a circuit diagram or a design. Based on that the human eyes perceive the local average luminance rather than the pixel's luminance itself, the proposed system uses a local activitymeasure (LAM), which is the difference between a pixel luminance and the average of its $3{\times}3$ neighborhood pixels' luminances weighted according to the spatial positioning. The system also usesinformation of edge enhancement(IEE), which is computed from the LAM multiplied by the average luminance. The IEE is added to the quantizer's input pixel and feeds into the halftoning quantizer. The quantizer produces the halftone image having the enhanced edge. The simulation results show that the proposed method produces more fine halftoning images than conventional methods due to the enhanced edges. Also the performance of the proposed method is compared with that of the conventional method by measuring the edge correlation and the local average accordance over a range of viewing distances.

Effect of Atmospheric Music and Advertising Photo on Consumers' Emotional State and Approach Behavior in Fashion Store (패션점포 내 배경음악과 광고사진이 소비자의 정서 및 접근행동에 미치는 영향)

  • Ki, Hyun-Myoung;Lee, Yu-Ri
    • Journal of Global Scholars of Marketing Science
    • /
    • v.16 no.3
    • /
    • pp.39-60
    • /
    • 2006
  • The purpose of this study is to investigate the effect of two different characteristics of music(tempo) and advertising photograph(type) in a fashion store on consumers' emotional responses and approach behavior and to suggest competitive in-store atmospheric strategies. To test the conceptual model, this study used a video simulation method. Researchers selected a fashion casual wear retail store for young people and videotaped to provide realistic store settings. Two different levels of background music(fast, slow) and advertising photograph(sexy, cheerful) were inserted into the video clip generating four stimuli. Including a stimulus for the control group, 5 video clips were created. A total of 289 subjects answered the questionnaire after viewing a two-minute video clips. The results are as follows: First, advertising photograph in a store had a significant effect on consumers' in-store emotional state, whereas musical tempo did not. Second, the effect of in-store consumers' emotional state on behavioral reponses were investigated. Results showed that consumers' positive emotional state lead to consumers' approach behavior. The results of this study indicated that background music and advertising photograph in a fashion store affected consumers' in-store emotional state, and ultimately these affected consumers' positive approach behavior. Thus retailer should try to create a pleasant store environment using effective store atmospheric factors like background music and advertising photograph.

  • PDF

Time- and Frequency-Domain Block LMS Adaptive Digital Filters: Part Ⅰ- Realization Structures (시간영역 및 주파수영역 블럭적응 여파기에 관한 연구 : 제1부- 구현방법)

  • Lee, Jae-Chon;Un, Chong-Kwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.7 no.4
    • /
    • pp.31-53
    • /
    • 1988
  • In this work we study extensively the structures and performance characteristics of the block least mean-square (BLMS) adaptive digital filters (ADF's) that can be realized efficiently using the fast Fourier transform (FFT). The weights of a BLMS ADF realized using the FFT can be adjusted either in the time domain or in the frequency domain, leading to the time-domain BLMS(TBLMS) algorithm or the frequency-domain BLMS (FBLMS) algorithm, respectively. In Part Ⅰof the paper, we first present new results on the overlap-add realization and the number-theoretic transform realization of the FBLMS ADF's. Then, we study how we can incorporate the concept of different frequency-weighting on the error signals and the self-orthogonalization of weight adjustment in the FBLMS ADF's , and also in the TBLMS ADF's. As a result, we show that the TBLMS ADF can also be made to have the same fast convergence speed as that of the self-orthogonalizing FBLMS ADF. Next, based on the properties of the sectioning operations in weight adjustment, we discuss unconstrained FBLMS algorithms that can reduce two FFT operations both for the overlap-save and overlap-add realizations. Finally, we investigate by computer simulation the effects of different parameter values and different algorithms on the convergence behaviors of the FBLMS and TBLMS ADF's. In Part Ⅱ of the paper, we will analyze the convergence characteristics of the TBLMS and FBLMS ADF's.

  • PDF

A Study on the Robust Double Talk Detector for Acoustic Echo Cancellation System (음향반항 제거 시스템을 위한 강인한 동시통화 검출기에 관한 연구)

  • 백수진;박규식
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.2
    • /
    • pp.121-128
    • /
    • 2003
  • Acoustic Echo Cancellation(m) is very active research topic having many applications like teleconference and hands-free communication and it employs Double Talk Detector(DTD) to indicate whether the near-end speaker is active or not. However. the DTD is very sensitive to the variation of acoustical environment and it sometimes provides wrong information about the near-end speaker. In this paper, we are focusing on the development of robust DTD algorithm which is a basic building block for reliable AEC system. The proposed AEC system consists of delayless subband AEC and narrow-band DTD. Delayless subband AEC has proven to have excellent performance of echo cancellation with a low complexity and high convergence speed. In addition, it solves the signal delay problem in the existing subband AEC. On the other hand, the proposed narrowband DTD is operating on low frequency subband. It can take most advantages from the narrow subband such as a low computational complexity due to the down-sampling and the reliable DTD decision making procedure because of the low-frequency nature of the subband signal. From the simulation results of the proposed narrowband DTD and wideband DTD, we confirm that the proposed DTD outperforms the wideband DTD in a sense of removing possible false decision making about the near-end speaker activity.

Optimizing Total Transport Cost Incurred under Specific Port System: With a Case of Managing POSCO-owned Berths (특수항만구조하에서의 물류비용 최적화에 관한 연구 - 포항제철의 원료부두 사례를 중심으로 -)

  • Kim, Weon-Jae
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.3
    • /
    • pp.42-55
    • /
    • 2010
  • This paper primarily deals with a decision-making for determining the number of voyages in each ship size under a specific port structure in order to minimize the total transport cost consisting of transport cost at sea, queuing cost in port, and inventory cost in yard. As a result of computer simulation using queuing model characterized by inter-arrival time distribution, we were able to find out some combination of voyage numbers of 3 ship-size(50,000-ton, 100,000-ton, and 200,000-ton), where the total transport cost can be minimized under a specific port structure. The simulation model also allows us to figure out any trade-off relationship among sea transport cost, queuing cost in port, and inventory cost in yard. Put it differently, an attempt to reduce the sea transport cost by increasing the number of voyages of the largest ship size, the transport cost incurred in both port and yard is hypothesized to be increased and vice versa. Consequently, Port managers are required to adjust the number of annual number of voyages allocated in each ship size, put into the sea lines for importing raw materials, in order to optimize the transport costs incurred under the specific port system. We may consider a net present value(NPV) model for performing an economic feasibility analysis on port investment project. If a total discounted net benefit, including cost savings, exceeds the initial investment for an additional berth construction, then we accept the port investment project. Otherwise, we reject the proposed port investment plan.

An Enhanced Greedy Message Forwarding Protocol for High Mobile Inter-vehicular Communications (고속으로 이동하는 차량간 통신에서 향상된 탐욕 메시지 포워딩 프로토콜)

  • Jang, Hyun-Hee;Yu, Suk-Dae;Park, Jae-Bok;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.3
    • /
    • pp.48-58
    • /
    • 2009
  • Geo-graphical routing protocols as GPSR are known to be very suitable and useful for vehicular ad-hoc networks. However, a corresponding node can include some stale neighbor nodes being out of a transmission range, and the stale nodes are pone to get a high priority to be a next relay node in the greedy mode. In addition, some useful redundant information can be eliminated during planarization in the recovery mode. This paper deals with a new recovery mode, the Greedy Border Superiority Routing(GBSR), along with an Adaptive Neighbor list Management(ANM) scheme. Each node can easily treat stale nodes on its neighbor list by means of comparing previous and current Position of a neighbor. When a node meets the local maximum, it makes use of a border superior graph to recover from it. This approach improve the packet delivery ratio while it decreases the time to recover from the local maximum. We evaluate the performance of the proposed methods using a network simulator. The results shown that the proposed protocol reveals much better performance than GPSR protocol. Please Put the of paper here.

Human-likeness of an Agent's Movement-Data Loci based on Realistically Limited Perception Data (제한적 인지 데이터에 기초한 에이전트 움직임-데이터 궤적의 인간다움)

  • Han, Chang-Hee;Kim, Won-Il
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.4
    • /
    • pp.1-10
    • /
    • 2010
  • This present paper's goal is to show a virtual human agent's movement-data loci based on realistically limited perception data is human-like. To determine human-likeness of the movement-data loci, we consider interactions between two parameters: Realistically Limited Perception (RLP) data and Incremental Movement-Path data Generation (IMPG). That is to consider how the former (i.e., RLP), one of the simulated parameters of human thought or its elements dictates the latter (i.e., IMPG), one of the simulated parameters of human movement behavior. Mapping DB is a prerequisite for navigation in an agent system because it functions as an interface between perception and movement behavior. Although Hill et al. studied mapping DB methodology based on RLP, their research dealt only with a rendering camera's view point data. The agent system in this present paper was integrated with the Hill's mapping DB module and then the two parameters' interaction was considered on a military reconnaissance mission with unexpected enemy emergence. Movement loci that were generated by the agent and subjects were compared with each other. The agent system in this present research verifies that it can be a functional test bed for producing human-like movement-data loci although the human-likeness of agent is the result of a pilot test, determined by two parameters (RLP and IMPG) and only 30 subjects.

Equity-Efficiency Trade-off: the Case of Inheritance Tax (상속세(相續稅)에 있어서의 형평(衡平)과 효율성(效率性)의 괴리(乖離))

  • Moon, Hyung-pyo
    • KDI Journal of Economic Policy
    • /
    • v.12 no.4
    • /
    • pp.97-111
    • /
    • 1990
  • This paper examines the effect of redistributive inheritance tax on income distribution and social welfare. The model used here is the Overlapping-Generations Model consisting of individuals with different bequest motives where the lifetime income distribution in each cohort is determined endogeneously by the dynamic bequest process. It is shown that the introduction of redistributive inheritance tax can improve the vertical equity in the sense that the increase in tax rate reduces the coefficient of variations of intra-cohort income distribution in steady-state. However, it is also shown that, the effect on social welfare, when measured by Benthamite SWF, is uncertain in general. The numerical simulations show that, in spite of its equity-enhancing effect, the tax increase can actually lower the steady-state social welfare within the plausible range of parametric values, through the long-run output effect as well as the deadweight welfare loss incurred by tax distortion. Hence, the problem of equity-efficiency trade-off can arise in this case. However, if both the market interest rate and the elasticity of marginal utility in individual's preference function are sufficiently high, it is shown to be possible that the steady-state social welfare is enhanced by the introduction of inheritance tax.

  • PDF

A Study on Detecting Selfish Nodes in Wireless LAN using Tsallis-Entropy Analysis (뜨살리스-엔트로피 분석을 통한 무선 랜의 이기적인 노드 탐지 기법)

  • Ryu, Byoung-Hyun;Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.12-21
    • /
    • 2012
  • IEEE 802.11 MAC protocol standard, DCF(CSMA/CA), is originally designed to ensure the fair channel access between mobile nodes sharing the local wireless channel. It has been, however, revealed that some misbehavior nodes transmit more data than other nodes through artificial means in hot spot area spreaded rapidly. The misbehavior nodes may modify the internal process of their MAC protocol or interrupt the MAC procedure of normal nodes to achieve more data transmission. This problem has been referred to as a selfish node problem and almost literatures has proposed methods of analyzing the MAC procedures of all mobile nodes to detect the selfish nodes. However, these kinds of protocol analysis methods is not effective at detecting all kinds of selfish nodes enough. This paper address this problem of detecting selfish node using Tsallis-Entropy which is a kind of statistical method. Tsallis-Entropy is a criteria which can show how much is the density or deviation of a probability distribution. The proposed algorithm which operates at a AP node of wireless LAN extracts the probability distribution of data interval time for each node, then compares the one with a threshold value to detect the selfish nodes. To evaluate the performance of proposed algorithm, simulation experiments are performed in various wireless LAN environments (congestion level, how selfish node behaviors, threshold level) using ns2. The simulation results show that the proposed algorithm achieves higher successful detection rate.