• Title/Summary/Keyword: Communication log

Search Result 388, Processing Time 0.029 seconds

Erlang Capacity of Cellular CDMA Mobile Communication System with soft Handoff (소프트 핸드오프를 갖는 셀룰러 CDMA 이동통신 시스템의 Erlang 용랑)

    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3A
    • /
    • pp.334-341
    • /
    • 2000
  • This paper presents an analysis of the capacity, the interference of adjacent cells of a CDMA cellular system, depending on the soft handoff region and log-normal shadowing. The optimum soft handoff region is chosen by using Erlang capacity. It is shown that when the soft handoff region increases, the Erlang capacity increase due to a reduction of the interference power of adjacent cells. But if the region is increased above a certain value, there is no improvement in the system’s capacity. Furthermore as the standard deviation of the log-normal shadowing's normal distribution factor increases, the soft handoff region has to be increased linearly to achieve the same Erlang capacity.

  • PDF

Miniaturized LPDA Antenna for Portable Direction Finding Applications

  • Yeo, Jun-Ho;Lee, Jong-Ig
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.118-121
    • /
    • 2012
  • In this letter, a miniaturized log-periodic dipole array (LPDA) antenna operating from 1 GHz to 6 GHz is proposed for portable direction finding applications. To reduce the lateral size of an LPDA antenna, bow-tie elements and a top-loading technique are utilized and spacing factor is decreased to reduce the spacing between the LPDA elements. The proposed miniaturized LPDA antenna has the measured gain and front-to-back ratio ranging from 1.2 dBi to 3 dBi and from 7 dB to 22 dB, respectively.

Effect of the covariance function on the statistics of speckle propagation through the turbulent atmosphere. (교란 대기를 통한 스펙클 전파의 통계적 코바리언스 함수의 효과)

  • 성평식;박계원
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.1
    • /
    • pp.29-34
    • /
    • 1999
  • In the paper, the extened Huygens-Fresnel principle has been used to make an analysis of the statistics the received intensity for speckle propagation though the turbulent atmosphere. The results of these formulations include of the log-amplitude covariance as well as the wave structure functions, and It was found that the normalized variance is dependent on the turblence strength and rises above unity.

  • PDF

A Study on the Calculation and Provision of Accruals-Quality by Big Data Real-Time Predictive Analysis Program

  • Shin, YeounOuk
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.193-200
    • /
    • 2019
  • Accruals-Quality(AQ) is an important proxy for evaluating the quality of accounting information disclosures. High-quality accounting information will provide high predictability and precision in the disclosure of earnings and will increase the response to stock prices. And high Accruals-Quality, such as mitigating heterogeneity in accounting information interpretation, provides information usefulness in capital markets. The purpose of this study is to suggest how AQ, which represents the quality of accounting information disclosure, is transformed into digitized data in real-time in combination with IT information technology and provided to financial analyst's information environment in real-time. And AQ is a framework for predictive analysis through big data log analysis system. This real-time information from AQ will help financial analysts to increase their activity and reduce information asymmetry. In addition, AQ, which is provided in real time through IT information technology, can be used as an important basis for decision-making by users of capital market information, and is expected to contribute in providing companies with incentives to voluntarily improve the quality of accounting information disclosure.

A Convex Layer Tree for the Ray-Shooting Problem (광선 슈팅 문제를 위한 볼록 레이어 트리)

  • Kim, Soo-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.753-758
    • /
    • 2017
  • The ray-shooting problem is to find the first intersection point on the surface of given geometric objects where a ray moving along a straight line hits. Since rays are usually given in the form of queries, this problem is typically solved as follows. First, a data structure for a collection of objects is constructed as preprocessing. Then, the answer for each query ray is quickly computed using the data structure. In this paper, we consider the ray-shooting problem about the set of vertical line segments on the x-axis. We present a new data structure called a convex layer tree for n vertical line segments given by input. This is a tree structure consisting of layers of convex hulls of vertical line segments. It can be constructed in O(n log n) time and O(n) space and is easy to implement. We also present an algorithm to solve each query in O(log n) time using this data structure.

Digit-Serial Finite Field Multipliers for GF($3^m$) (GF($3^m$)의 Digit-Serial 유한체 곱셈기)

  • Chang, Nam-Su;Kim, Tae-Hyun;Kim, Chang-Han;Han, Dong-Guk;Kim, Ho-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.10
    • /
    • pp.23-30
    • /
    • 2008
  • Recently, a considerable number of studies have been conducted on pairing based cryptosystems. The efficiency of pairing based cryptosystems depends on finite fields, similar to existing public key cryptosystems. In general, pairing based ctyptosystems are defined over finite fields of chracteristic three, GF($3^m$), based on trinomials. A multiplication in GF($3^m$) is the most dominant operation. This paper proposes a new most significant digit(MSD)-first digit- serial multiplier. The proposed MSD-first digit-serial multiplier has the same area complexity compared to previous multipliers, since the modular reduction step is performed in parallel. And the critical path delay is reduced from 1MUL+(log ${\lceil}n{\rceil}$+1)ADD to 1MUL+(log ${\lceil}n+1{\rceil}$)ADD. Therefore, when the digit size is not $2^k$, the time delay is reduced by one addition.

Analysis on System Log of Huawei Smartphone (화웨이 스마트폰 시스템 로그에 대한 분석)

  • Park, Eunhu;Kim, Soram;Kim, Jongsung
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.9-17
    • /
    • 2018
  • Smartphone have become commonplace because they have the advantage of facilitating communication with others and making life easier. The smartphone's system log stores various data related to the user actions. Since 2015, Huawei has been growing rapidly, with its sales volume increasing and it was ranked second in the world in three years. The use of Huawei smartphones by many users means that Huawei smartphones are likely to be used to detect traces of criminal investigations, so we need to study system logs of Huawei smartphones. Therefore, in this paper, we analyze system log which is forensically meaningful for Huawei smartphone. We also propose how to use logs in forensic investigation.

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Radius Optimization for Efficient List Sphere Decoding (효율적인 리스트 구복호기 검출방식을 위한 구반경의 최적화에 관한 연구)

  • Lee, Jae-Seok;Lee, Byung-Ju;Shim, Byong-Hyo
    • Journal of Broadcast Engineering
    • /
    • v.15 no.6
    • /
    • pp.742-748
    • /
    • 2010
  • Instead of using sphere decoding, list sphere decoding (LSD) has been introduced to increase the reliability of log-likelihood ratio (LLR) in recent soft decoding schemes employing iterative detection and decoding (IDD). Although LSD provides improved performance, it does not obtain complexity gain due to signal-to-noise ratio (SNR) increment as it detects large number of lattice points. Especially, its inefficient scenario arises when it has to search for lattice points which have small affect for obtaining LLR with high reliability. In this paper, we study an efficient algorithm to remove such lattice points, which results in complexity reduction based on radius optimization.

Development of Multi-connection Terminal Emulator (다중 연결이 가능한 터미널 에뮬레이터 개발)

  • Choi, Hong-Soek;Kim, Youn-Su;Kim, Jin-Su;Ju, Young-Kwan;Jeon, Joong-Nam
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.173-179
    • /
    • 2017
  • Recently, with the development of IoT, there have been increasing cases of transmitting and receiving data by connecting more than one devices supporting various communication methods. In this paper, we propose a multi-terminal emulator supporting various communication methods. The system supports multiple channel connections for each communication method, schedules data transmission, collects communication statistics, represents them into graphs, and stores log records. By using this system, it is possible to test the communication connection between multiple devices, and it is expected to provide convenience for IoT system development.