• Title/Summary/Keyword: 성공의 확률

Search Result 367, Processing Time 0.031 seconds

A Study on MAC Protocol with Dynamic Priority Adjustment in WBAN (WBAN 환경에서 동적 우선순위를 적용한 MAC 프로토콜에 관한 연구)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1589-1598
    • /
    • 2014
  • To support the WBAN, IEEE 802.15 Task Group 6 announced standardized documents on technical requirements of the PHY and MAC. In the IEEE 802.15.6 MAC protocol, CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) algorithm is performed based on the eight-level priorities according to the type of traffics of the periodic data from medical sensor nodes. Several nodes, which detected the changed bio signals, transmit emergency data at the same time, so latency could be higher than emergency latency and energy consumption will increase. In this thesis, we proposed a CSMA/CA algorithm in WBAN to solve these problems. Simulations are performed using a Castalia based on the OMNeT++ network simulation framework to estimate the performance of the proposed superframe and algorithms. Performance evaluation results show that the packet transmission success rate and energy efficiency are improved by reducing the probability of collision using the proposed MAC protocol.

Deciding Priority of Safety Messages using Decision Tree in IEEE 802.11p/1609.4 Vehicular Network (802.11p/1609 차량네트워크에서 Decision Tree를 이용한 안전메세지 우선순위 결정 기법)

  • Baik, Hyein;Kwon, YongHo;Rhee, Byung Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.794-797
    • /
    • 2015
  • As the interest in VANET is increased, a study on the beacon message transmission between vehicles is actively being made. IEEE 802.11p/1609.4 standard is based on a multichannel system consisting of multiple service channels (SCH) and a control channel (CCH). Multiple SCHs are defined for nonsafety data transfer, while the CCH is used to broadcast safety messages called beacons and control messages (i.e., service advertisement messages). However, most messages broadcast in the only one CCH belong to safety application that must be contested in dense vehicular network. This paper suggests safety message transfer algorithm in dense vehicular congestion. The proposed algorithm is that the priority of safety messages is decided by decision tree and messages are stored in proper queues according to their priorities. Then, safety messages with higher priorities are sent in turn by CCH in the assigned time. The proposed algorithm decreases the beacon transmission delay and increase on the probability of a successful beacon reception in an IEEE 802.11p/1609.4-based network.

  • PDF

A Collision Compensation Method for CSMA/CR Protocol in Wireless LAN (포화상태인 무선랜 네트워크에서 Carrier Sensing Multiple Access with Collision Resolution (CSMA/CR) 프로토콜의 실용화를 위한 충돌 보상 방법)

  • Kim, Ji-in;Park, Byung-hyun;Kwon, YongHo;Rhee, Byung Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1033-1036
    • /
    • 2013
  • A study about collision resolution is needed because huge file, video and multimedia information are transmitted to wireless LAN. CSMA/CR protocol guarantees fairness, but doesn't consider QoS. To practicalize CSMA/CR protocol in saturation fully-connected single hop network environments, this paper proposes method of collision compensation. previous CSMA/CR protocol chooses CR Slot only considering fairness, but this paper chooses front CR Slot for compensation of collision to station experiencing collisions. The station transmits jam signal and has channel priority of transmission. So transmitting efficiency and successful transmission probability rise. This proposed simple method can offer benefit to station experiencing collisions without additional hardware cost.

  • PDF

A Study on the Development of a Program to support VFSS by using Deeplearning (딥러닝을 활용한 VFSS를 도와주는 프로그램 개발 연구)

  • Choi, Dong-gyu;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.58-61
    • /
    • 2018
  • In Korea, current medical technology is the highest level in the world. As a result, many doctors have specialized knowledge of various disorders or diseases, and are proceeding in a better way. With such high medical technology, it is possible to increase the probability of success of surgery to provide high reliability to patients. Rehabilitation is also a form of medical treatment that reduces the side effects that occur after surgery that is done for quick cure. However, the situation in this section is slightly different. There are moves to develop rehabilitation devices and operations, but most of them are now dependent on foreign technology. Rehabilitation therapy, which we commonly know, is dominated by behavior. However, it is also a kind of rehabilitation to find out how much the patient's symptoms are improved or recovered. In this paper, we have studied the development of a program by using the Deeplearning method in order to detect the problem of the food swallowing operation by the severity.

  • PDF

Performance Analysis of PCM Cell Search Algorithm for Fast Cell Search in WCDMA Systems (WCDMA. 시스템에서 빠른 셀 탐색을 위한 극성 변조 셀 탐색 알고리즘의 성능 분석)

  • 배성오;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8A
    • /
    • pp.598-606
    • /
    • 2003
  • In this paper, we analyze the performance of the PCM cell search algorithm proposed for fast cell search of WCDMA systems. In order to improve both performance and complexity of the cell search algorithm standardized for WCDMA systems the PCM scheme uses a group of the polarization codes produced by a Gold code generator. The PCM scheme only uses one synchronization channel since the polarization codes modulated on P-SCH can replace the RS codes of S-SCH. Thus, the PCM reduces the BS's transmission power since only one synchronization channel can be used, and it can also reduce the complexity of receiver as compared with the conventional one. In this paper, by defining a numerical model, we analyze the performance of the PCM cell search algorithm in terms of detection probability and mean acquisition time. Consequently, we could demonstrate that the PCM cell search algorithm is superior to the standard WCDMA cell search algorithm.

Multicast Coverage Prediction in OFDM-Based SFN (OFDM 기반의 SFN 환경에서의 멀티캐스트 커버리지 예측)

  • Jung, Kyung-Goo;Park, Seung-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3A
    • /
    • pp.205-214
    • /
    • 2011
  • In 3rd generation project partnership long term evolution, wireless multicast techniques which send the same data to multiple users under single frequency networks have attracted much attention. In the multicast system, the transmission mode needs to be selected for efficient data transfer while satisfying the multicast coverage requirement. To achieve this, users' channel state information (CSI) should be available at the transmitter. However, it requires too much uplink feedback resource if all the users are allowed to transmit their CSI at all the time. To solve this problem, in this paper, the multicast coverage prediction is suggested. In the proposed algorithm, each user measures its transition probabilities between the success and the fail state of the decoding. Then, it periodically transmits its CSI to the basestation. Using these feedbacks, the basestation can predict the multicast coverage. From the simulation results, we demonstrate that the proposed scheme can predict the multicast system coverage.

Flood fragility analysis of bridge piers in consideration of debris impacts (부유물 충돌을 고려한 교각의 홍수 취약도 해석 기법)

  • Kim, Hyunjun;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.325-331
    • /
    • 2016
  • This research developed a flood fragility curve of bridges considering the debris impacts. Damage and failures of civil infrastructure due to natural disasters can cause casualties as well as social and economic losses. Fragility analysis is an effective tool to help better understand the vulnerability of a structure to possible extreme events, such as earthquakes and floods. In particular, flood-induced failures of bridges are relatively common in Korea, because of the mountainous regions and summer concentrated rainfall. The main failure reasons during floods are reported to be debris impact and scour; however, research regarding debris impacts is considered challenging due to various uncertainties that affect the failure probability. This study introduces a fragility analysis methodology for evaluating the structural vulnerability due to debris impacts during floods. The proposed method describes how the essential components in fragility analysis are considered, including limit-state function, intensity measure of the debris impact, and finite element model. A numerical example of the proposed fragility analysis is presented using a bridge pier system under a debris impact.

Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.25-32
    • /
    • 2019
  • In this paper, we propose a method to apply the attack surface expansion through decoy traps to a protected server network. The network consists of a large number of decoys and protected servers. In the network, each protected server dynamically mutates its IP address and port numbers based on Hidden Tunnel Networking that is a network-based moving target defense scheme. The moving target defense is a new approach to cyber security and continuously changes system's attack surface to prevent attacks. And, the attack surface expansion is an approach that uses decoys and decoy groups to protect attacks. The proposed method modifies the NAT table of the protected server with a custom chain and a RETURN target in order to make attackers waste all their time and effort in the decoy traps. We theoretically analyze the attacker success rate for the protected server network before and after applying the proposed method. The proposed method is expected to significantly reduce the probability that a protected server will be identified and compromised by attackers.

A mobile data caching synchronization strategy based on in-demand replacement priority (수요에 따른 교체 우선 순위 기반 모바일 데이터베이스 캐쉬 동기화 정책)

  • Zhao, Jinhua;Xia, Ying;Lee, Soon-Jo;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • Mobile data caching is usually used as an effective way to improve the speed of local transaction processing and reduce server load. In mobile database environment, due to its characters - low bandwidth, excessive latency and intermittent network, caching is especially crucial. A lot of mobile data caching strategies have been proposed to handle these problems over the last few years. However, with smart phone widely application these approaches cannot support vast data requirements efficiently. In this paper, to make full use of cache data, lower wireless transmission quantity and raise transaction success rate, we design a new mobile data caching synchronization strategy based on in-demand and replacement priority. We experimentally verify that our techniques significantly reduce quantity of wireless transmission and improve transaction success rate, especially when mobile client request a large amount of data.

A Study on the Social Worker's Job Satisfaction and Self-efficacy (사회복지사의 직무만족과 자기효능감에 관한 탐색적 연구)

  • Kim, Jong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.157-165
    • /
    • 2013
  • This paper provides theoretical background on the relationship between social worker's Job satisfaction and Self-efficacy for Empirical Search. According to previous researches, the more social workers feel self-efficacy the better they select their jobs actively and work very hard. In addition, they are more likely to challenge constantly and have more possibility to carry out their tasks successfully. However, it is assumed that there are theoretical differences in Social Welfare Area compared with other Social Science Area due to the particularity of Social Worker's Job and tasks. Therefore, the aims of this paper is to review theoretical background on the relationship between Job Satisfaction and Self-efficacy in other Social Science Area and provide the groundwork for the expansion of Social Work Practice Research Area through Empirical Analysis in the future.