• Title/Summary/Keyword: Access Matrix

Search Result 153, Processing Time 0.032 seconds

Vertical class fragmentation in distributed object-oriented databases (분산 객체 지향 데이타베이스에서 클래스의 기법)

  • 이순미;임해철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.215-224
    • /
    • 1997
  • This paper addresses the vertical class fragmentation in distributed object-oriented databases. In the proposed vertical fragmentation, after producing the attribute fragment by partitioning attributes, then the method fragment is produced by gathering methods referring the attribute in each fragment. For partitioning attributes, we define query access matrix(QAM) and method access matrix(MAM) to express attributes that method refers, and extend QAM, MAM and attribute usage matrix(AUM) to universal class environment for representing relationship among other classes through class hierarchy and class composite hierarchy.

  • PDF

A study on the optimization of network resource allocation scheme based on access probabilities (접근확률 기반의 네트워크 자원할당방식의 최적화에 관한 연구)

  • Kim Do-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1393-1400
    • /
    • 2006
  • This paper optimizes the access probabilities (APs) in a network resource allocation scheme based on access probabilities in order that the waiting time and the blocking probability are minimized under the given constraints, and obtains its performance. In order to optimize APs, an infinite number of balance equations is reduced to a finite number of balance equations by applying Neuts matrix geometric method. And the nonlinear programming problem is converted into a linear programming problem. As a numerical example, the performance measures of waiting time and blocking probability for optimal access probabilities and the maximum utilization under the given constraints are obtained. And it is shown that the scheme with optimal APs gives more performance build-up than the strategy without optimization.

Implimentation of Parallel Procssor System with Reliability (신뢰성을 고려한 병열프로세서에서 구성)

  • 고명삼;정택원
    • 전기의세계
    • /
    • v.31 no.5
    • /
    • pp.355-360
    • /
    • 1982
  • In numerical computation, it is desirable to access any row or column, the main diagonal, subarrays, of a matrix without any conflict for successful parallel processing. To meet this requirement special storage scheme is used for conflict-free access of necessary data. Interconnection network, which connects processing elements and processing element memory modules, is required to execute the necessary operations. In this paper we discuss the skewing method for conflict-free, access to various bit slices and single-stage interconnection networks.

  • PDF

Performance Improvement of the Smart Antenna Placed in Wi-Fi Access Point (와이파이AP 용 FFT 전단 스마트안테나의 성능 개선)

  • Hong, Young-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2437-2442
    • /
    • 2013
  • OFDM Wi-Fi AP is susceptible to the co-channel interference. As a countermeasure, the insertion of a smart has been addressed. Despite of the guaranteed efficiency, the complexity of the post-FFT algorithm often keeps itself from being selected as the countermeasure. Instead, simply constructed pre-FFT smart antenna of which the algorithm is based on the received signal covariance matrix is commonly used and the mathematical modeling of it has been deployed. Computer simulations evaluating the improved BER characteristics of the proposed pre-FFT using the covariance matrix of channel estimator output have been carried out. It has been demonstrated that channel matrix output based smart antenna is superior to that using received signal covariance matrix.

Spatial Multiuser Access for Reverse Link of Multiuser MIMO Systems

  • Shin, Oh-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10A
    • /
    • pp.980-986
    • /
    • 2008
  • Spatial multiuser access is investigated for the reverse link of multiuser multiple-input multiple-output (MIMO) systems. In particular, we consider two alternative a aches to spatial multiuser access that adopt the same detection algorithm at the base station: one is a closed-loop approach based on singular value decomposition (SVD) of the channel matrix, whereas the other is an open-loop approach based in space-time block coding (STBC). We develop multiuser detection algorithms for these two spatial multiuser access schemes based on the minimum mean square error (MMSE) criterion. Then, we compare the bit error rate (BER) performance of the two schemes and a single-user MIMO scheme. Interestingly, it is found that the STBC approach can provide much better BER performance than the SVD approach as well as than a single-user MIMO scheme.

Channel Coding Based Physical Layer Security for Wireless Networks (채널 부호화를 통한 물리계층 무선네트워크 보안기술)

  • Asaduzzaman, Asaduzzaman;Kong, Hyung Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF

Design of Data Encoding Algorithm for a Two Dimensional Bar Code (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Kim, Il-Hwan
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.171-174
    • /
    • 2005
  • In this paper, we propose a new data encoding algorithm for a two-dimensional bar code system. In general, the one-dimensional bar code is just a key which can access detailed information to the host computer database. But the two-dimensional bar code is a new technology which can obtain high density information without access to the host computer database. We implemented the encoding algorithm for Data Matrix bar code which is the most widely used among the many kinds of two-dimensional bar codes in the field of marking using Digital Signal Processor (TMS320C31). The performance of the proposed algorithm is verified by comparing the imprinted symbols on the steel surfaces with the codes which are decoded by a bar code reader.

  • PDF

Design of Data Encoding Algorithm for the Two Dimensional Barcode (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Her, Nam-Euk;Kim, Il-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.173-175
    • /
    • 2005
  • In this paper, we propose a data encoding algorithm for two-dimensional barcode system. In general, one-dimensional barcode is just a key which can access detailed information to the host computer database. But the two-dimensional barcode is a new technology which can obtain high density information without access to the host computer database. We implemented encoding algorithm for Data Matrix Barcode which is the most widely used among the many kind of two-dimensional barcodes. And we marked to a real object using Digital Signal Processor(DSP) Marking System. The performance of proposed algorithm is verified through the result of marking work.

  • PDF

Design and Simulation of Two-Dimensional OCDMA En/Decoder Composed of Double Ring Add/Drop Filters and Delay Waveguides

  • Chung, Youngchul
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.2
    • /
    • pp.257-262
    • /
    • 2016
  • A two-dimensional optical code division multiple access (OCDMA) en/decoder composed of four double-ring resonator add/drop filters and three delay waveguides is designed, and a transfer matrix method combined with fast Fourier transform is implemented to provide numerical simulations for the en/decoder. The auto-correlation peak level over the maximum cross-correlation level is larger than 3 at the center of the correctly decoded pulse for most of wavelength hopping and spectral phase code combinations, which assures the BER lower than 10-3 which corresponds to the forward error correction limit.

Benchmarks for Performance Testing of MPI-IO on the General Parallel File System (범용 병렬화일 시스템 상에서 MPI-IO 방안의 성능 평가 벤티마크)

  • Park, Seong-Sun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.2
    • /
    • pp.125-132
    • /
    • 2001
  • IBM developed the MPI-IO, we call it MPI-2, on the General Parallel File System. We designed and implemented various Matrix Multiplication Benchmarks to evaluate its performances. The MPI-IO on the General Parallel File System shows four kinds of data access methods : the non-collective and blocking, the collective and blocking, the non-collective and non-blocking, and the split collective operation. In this paper, we propose benchmarks to measure the IO time and the computation time for the data access methods. We describe not only its implementation but also the performance evaluation results.

  • PDF