• 제목/요약/키워드: Computer-based Solution

검색결과 1,242건 처리시간 0.031초

Non-iterative Bit Loading Algorithm for OFDM in Independent and Correlated fading

  • Manry, John W.;Nagaraj, Santosh
    • Journal of Information Processing Systems
    • /
    • 제10권2호
    • /
    • pp.163-175
    • /
    • 2014
  • This paper will focus on improving the performance of orthogonal frequency division multiplexing (OFDM) in Rayleigh fading environments. The proposed technique will use a previously published method that has been shown to improve OFDM performance in independent fading, based on ordered sub-carrier selection. Then, a simple non-iterative method for finding the optimal bit-loading allocation was proposed. It was also based on ordered sub-carrier selection. We compared both of these algorithms to an optimal bit-loading solution to determine their effectiveness in a correlated fading environment. The correlated fading was simulated using the JTC channel models. Our intent was not to create an optimal solution, but to create a low complexity solution that can be used in a wireless environment in which the channel conditions change rapidly and that require a simple algorithm for fast bit loading.

Eye Blink Detection and Alarm System to Reduce Symptoms of Computer Vision Syndrome

  • Atheer K. Alsaif;Abdul Rauf Baig
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.193-206
    • /
    • 2023
  • In recent years, and with the increased adoption of digital transformation and spending long hours in front of these devices, clinicians have observed that the prolonged use of visual display units (VDUs) can result in a certain symptom complex, which has been defined as computer vision syndrome (CVS). This syndrome has been affected by many causes, such as light refractive errors, poor computer design, workplace ergonomics, and a highly demanding visual task. This research focuses on eliminating one of CVSs, which is the eye dry syndrome caused by infrequent eye blink rate while using a smart device for a long time. This research attempt to find a limitation on the current tools. In addition, exploring the other use cases to utilize the solution based on each vertical and needs.

수집된 경로데이터를 사용하는 내비게이션을 위한 대용량 경로조합 방법 (A Big-Data Trajectory Combination Method for Navigations using Collected Trajectory Data)

  • 구광민;이태호;박희민
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.386-395
    • /
    • 2016
  • In trajectory-based navigation systems, a huge amount of trajectory data is needed for efficient route explorations. However, it would be very hard to collect trajectories from all the possible start and destination combinations. To provide a practical solution to this problem, we suggest a method combining collected GPS trajectories data into additional generated trajectories with new start and destination combinations without road information. We present a trajectory combination algorithm and its implementation with Scala programming language on Spark platform for big data processing. The experimental results proved that the proposed method can effectively populate the collected trajectories into valid trajectory paths more than three hundred times.

ECTPN을 이용한 키복구 시스템의 명세 및 분석 (Specification and Analysis of Key Recovery System using ECTPN)

  • 고정호;강상승;전은아;이강수
    • 한국정보처리학회논문지
    • /
    • 제7권6호
    • /
    • pp.1874-1885
    • /
    • 2000
  • When a receiver of ciphertext message can not decrypt a message because he has lost his private-key, the private-key of receiver and session-key of the message should be recovered. In this paper, we developed an Encapsulation based Key Recovery System (EKRS). EKRS is a new key encapsulation based key recovery system which is characterized by secretly choice of KRA, randomized target keys. n-way recovery type, and useful for commercial key recovery. EKRS is formally specified by a pictorial model, an Extended Cryptographic Timed Petri Net (ECTPN). Secure information flow and reachability of a session-key are verified by using reachability graph of ECTPN. EKRS, executing over a Public Key Infrastructure, can be used as a security solution in Web based applications such as CALS, EC an EDI.

  • PDF

Hierarchical Age Estimation based on Dynamic Grouping and OHRank

  • Zhang, Li;Wang, Xianmei;Liang, Yuyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2480-2495
    • /
    • 2014
  • This paper describes a hierarchical method for image-based age estimation that combines age group classification and age value estimation. The proposed method uses a coarse-to-fine strategy with different appearance features to describe facial shape and texture. Considering the damage to continuity between neighboring groups caused by fixed divisions during age group classification, a dynamic grouping technique is employed to allow non-fixed groups. Based on the given group, an ordinal hyperplane ranking (OHRank) model is employed to transform age estimation into a series of binary enquiry problems that can take advantage of the intrinsic correlation and ordinal information of age. A set of experiments on FG-NET are presented and the results demonstrate the validity of our solution.

3차원 물품 적재에 관한 마이크로 컴퓨터용 프로그램 개발 (Development of a Micro-Computer based Program for the Three Dimensional Packing Problem)

  • 황학;이관재;선지웅
    • 대한산업공학회지
    • /
    • 제23권1호
    • /
    • pp.55-76
    • /
    • 1997
  • This paper presents a heuristic solution for the three dimensional container loading problem with boxes which are different in size. The container loading problem is formulated as a zero-one mixed integer programming model whose objective is to maximize the container utilization. Due to its problem complexity, we propose a heuristic based on layered loading technique. Also, presented is a way to achieve the weighting balance of the stacked boxes. A micro-computer based program is developed which generates container loading pattern provided by the proposed heuristic. The results are displayed by computer-graphic. To evaluate the performance of the proposed heuristic, computational experiments are performed. The results indicate that in most of the cases the proposed heuristic performs better than an existing heuristic in terms of the container utilization.

  • PDF

Service Block Based Resource Allocation Scheme for Macrocell-Femtocell Networks

  • Lee, Jong-Chan;Lee, Moon-Ho
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권6호
    • /
    • pp.29-35
    • /
    • 2015
  • The heterogeneous LTE (Long Term Evolution)-Advanced networks comprising a macrocell and femtocells can provide an efficient solution not only to extend macrocell coverage but also to deal with packet traffics increasing explosively within macrocells. An efficient resource management scheme is necessary to maintain the QoS (Quality of Service) of mobile multimedia services because the LTE-Advanced system should support not only voice but also mobile applications such as data, image and video. This paper proposes a resource management scheme to guarantee QoS continuity of multimedia services and to maximize the resource utilization in OFDMA (Orthogonal Frequency Division Multiple Access) based LTE-Advanced systems. This scheme divides the resources into several service blocks and allocates those resources based on the competition between macrocell and femtocell. Simulation results show that it provides better performances than the conventional one in respect of handover failure rate and blocking rate.

초기 설계단계에서의 셋 베이스 다목적 설계 최적화(제2보) : 자동차 사이드 도어 임팩트 빔에의 적용 (Set-Based Multi-objective Design Optimization at the Early Phase of Design (The Second Report) : Application to Automotive Side-Door Impact Beams)

  • 남윤의
    • 산업경영시스템학회지
    • /
    • 제34권3호
    • /
    • pp.8-15
    • /
    • 2011
  • The computer-based simulation tools are currently used overwhelmingly to simulate the performance of automotive designs. Then, the search for an optimal solution that satisfies a number of performance requirements usually involves numerous iterations among several simulation tools. Therefore, meta-modeling techniques are becoming widely used to build approximations of computationally expensive computer analysis tools. The set-based approach proposed in the first report of a four-part paper has been a test bed for the innovation of vehicle structure design process in the Structural Design and Fabrication Committee of JSAE(Society of Automotive Engineers of Japan). In the second report, the proposed design approach is illustrated with a side-door impact beam design example using meta-modeling techniques.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.