• Title/Summary/Keyword: Communication log

Search Result 387, Processing Time 0.025 seconds

Turbo Coded OFDM Scheme for a High-Speed Power Line Communication (고속 전력선통신 시스템의 터보 부호화)

  • Lee, Jae-Sun;Kim, Yo-Cheol;Kim, Jung-Hui;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.190-196
    • /
    • 2009
  • In this paper, performance of a turbo-coded OFDM system is analyzed and simulated in a power line communication channel. Since the power line communication system typically operates in a hostile environment, turbo code has been employed to enhance reliability of transmitted data. The performance is evaluated in terms of bit error probability. As turbo decoding algorithms, MAP (maximum a posteriori), Max-Log-MAP, and SOVA (soft decision Viterbi output) algorithms are chosen and their performances are compared. From simulation results, it is demonstrated that Max-Log-MAP algorithm is promising in terms of performance and complexity. It is shown that performance is substantially improved by increasing the number of iterations and interleaver length of a turbo encoder. The results in this paper can be applied to OFDM-based high-speed power line communication systems.

  • PDF

Performance Evaluation of a Mobile Stratospheric Communication System on Measured Rician Log-Normal Fading Channel Models

  • Kang, Byeong-Gwon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1451-1454
    • /
    • 2002
  • In recent years, there are growing concerns about land mobile satellite (LMS) communication systems and mobile stratospheric communication systems (SCS) for the purpose of service upgrade of personal and mobile communications in near future. It is important to possess accurate channel model for prediction of the above system performance. Thus, in this paper, we evaluate the bit error rates of a coded BPSK system based on realistic channel model which can be applied to stratospheric communication systems. The channel data was made by fitting the parameters of probability distribution model to measured data. This approach was proposed by Corraza〔1〕and modified by You〔2〕. And also the effects of channel codings on the system performance are analyzed. As results, we can get the performance curve characteristics on realistic Rician log-normal fading channels with various communication environments.

  • PDF

3-Points Average Pivot Quicksort (3-점 평균 피벗 퀵정렬)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.295-301
    • /
    • 2014
  • In the absence of a sorting algorithm faster than O(n log n), Quicksort remains the best and fastest of its kind in practice. For given n data, Quicksort records running in O(n log n) at best and $O(n^2)$ at its worst. In this paper, I propose an algorithm by which 3-points average P=(L+M+H)/3 is set as a pivot for first array L=a[s], last array H=a[e], and middle array $M=a[{\lfloor}(s+e)/2{\rfloor}]$ in order to find the more fast than Quicksort. Test results prove that the proposed 3-points average pivot Quicksort has the time complexity of O(n log n) at its best, average, and worst cases. And the proposed algorithm can be reduce the $O(n^2)$ time of Quicksort to O(n log n).

A Customized Tourism System Using Log Data on Hadoop (로그 데이터를 이용한 하둡기반 맞춤형 관광시스템)

  • Ya, Ding;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.397-404
    • /
    • 2018
  • As the usage of internet is increasing, a lot of user behavior are written in a log file and the researches and industries using the log files are getting activated recently. This paper uses the Hadoop based on open source distributed computing platform and proposes a customized tourism system by analyzing user behaviors in the log files. The proposed system uses Google Analytics to get user's log files from the website that users visit, and stores search terms extracted by MapReduce to HDFS. Also it gathers features about the sight-seeing places or cities which travelers want to tour from travel guide websites by Octopus application. It suggests the customized cities by matching the search terms and city features. NBP(next bit permutation) algorithm to rearrange the search terms and city features is used to increase the probability of matching. Some customized cities are suggested by analyzing log files for 39 users to show the performance of the proposed system.

Miniaturized Design of Log-Periodic Dipole Array Antenna Using Half-Bowtie Dipole Elements (반-보우타이 모양 다이폴 소자를 이용한 대수-주기 다이폴 배열 안테나의 소형화 설계)

  • Yeo, Junho;Lee, Jong-Ig
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1057-1062
    • /
    • 2016
  • In this paper, a design method for a compact log-perio dic half-bow-tie dipole array antenna for an operation in a UWB band(3.1-10.6 GHz) is studied. The proposed antenna is miniaturized by using half-bow-tie shaped dipole elements instead of strip-type dipole elements, which are commonly used in a general log-periodic dipole array(LPDA) antenna, and by reducing the element spacing. The effects of the flare angle of the half-bow-tie elements and the spacing factor on input reflection coefficient and realized gain characteristics of the proposed log-periodic antenna are analyzed. The optimized antenna is fabricated on an FR4 substrate, and the experiment results show that the antenna has a frequency band of 2.95-11.31 GHz for a VSWR < 2, which assures the operation in the UWB band. In addition, the length and width of the proposed antenna are reduced to 32.1 % and 18.3 %, respectively, compared to the LPDA antenna.

Recovery Methods in Main Memory DBMS

  • Kim, Jeong-Joon;Kang, Jeong-Jin;Lee, Ki-Young
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.26-29
    • /
    • 2012
  • Recently, to efficiently support the real-time requirements of RTLS( Real Time Location System) services, interest in the main memory DBMS is rising. In the main memory DBMS, because all data can be lost when the system failure happens, the recovery method is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery method to reduce disk I/O in the main memory DBMS. Therefore, In this paper, we analyzed existing log techniques and check point techniques and existing main memory DBMSs' recovery techniques for recovery techniques research for main memory DBMS.

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

Methods to improve Log-MAP Decoding in Frequency Selective Fading Channels

  • Kim, Jeong-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.51-55
    • /
    • 2016
  • High-capacity, high quality services should be guaranteed in mobile communication environment. Excellent channel coding and compensation techniques are required so as to improve data reliability on fading channels. In this paper, we propose a method using double pilots, estimates and compensates for the fading of information symbols. The proposed method using Log-MAP Turbo decoder through the iterative decoder, improves BER performance under the environment of the frequency selective fading channel. Compared to the existing methods, the suggested methods show functional improvement of approximately 3dB in case that the number of iteration decoding is 5 and BER is $10^{-4}$.

Distributed FTP Server for Log Mining System on ACE (분산 FTP 서버의 ACE 기반 로그 마이닝 시스템)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.465-468
    • /
    • 2002
  • Today large corporations are constructing distributed server environment. Many corporations are respectively operating Web server, FTP server, Mail server and DB server on heterogeneous operation. However, there is the problem that a manager must manage each server individually. In this paper, we present distributed FTP server for log mining system on ACE. Proposed log mining system is based upon ACE (Adaptive Communication Environment) framework and data mining techniques. This system provides a united operation with distributed FTP server.

  • PDF

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.