• Title/Summary/Keyword: E-Metrics

Search Result 194, Processing Time 0.022 seconds

Performance Evaluation of Turbo Codes by Soft Detection Metrics of STBC over an IEEE 802.16e Link (IEEE 802.16e 링크에서 시공간 블록 부호의 연판정 검출에 따른 터보 부호의 성능평가)

  • Kim, Young-Min;Kim, Soo-Young;Lim, Kwang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.1-8
    • /
    • 2010
  • Multi antenna techniques using space-time codes can achieve diversity gains in a multi-path environment without additional bandwidth requirement. Most of the 4G candidate standards including the IEEE 802.16e adopt multi-input multi-output (MIMO) schemes to achieve either high throughput performance or diversity gains. In these 4G candidate standards, turbo codes using an iterative decoder with soft input soft output are used to overcome serious channel fading. For this reason, the estimated signal values from MIMO detectors should be soft decision detection values. In this paper, we propose efficient methods to estimate soft decision detection values for various space time coding schemes, and provide the simulation results of turbo coded space time coding scheme over an IEEE 802.16e link.

Application-aware Design Parameter Exploration of NAND Flash Memory

  • Bang, Kwanhu;Kim, Dong-Gun;Park, Sang-Hoon;Chung, Eui-Young;Lee, Hyuk-Jun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.4
    • /
    • pp.291-302
    • /
    • 2013
  • NAND flash memory (NFM) based storage devices, e.g. Solid State Drive (SSD), are rapidly replacing conventional storage devices, e.g. Hard Disk Drive (HDD). As NAND flash memory technology advances, its specification has evolved to support denser cells and larger pages and blocks. However, efforts to fully understand their impacts on design objectives such as performance, power, and cost for various applications are often neglected. Our research shows this recent trend can adversely affect the design objectives depending on the characteristics of applications. Past works mostly focused on improving the specific design objectives of NFM based systems via various architectural solutions when the specification of NFM is given. Several other works attempted to model and characterize NFM but did not access the system-level impacts of individual parameters. To the best of our knowledge, this paper is the first work that considers the specification of NFM as the design parameters of NAND flash storage devices (NFSDs) and analyzes the characteristics of various synthesized and real traces and their interaction with design parameters. Our research shows that optimizing design parameters depends heavily on the characteristics of applications. The main contribution of this research is to understand the effects of low-level specifications of NFM, e.g. cell type, page size, and block size, on system-level metrics such as performance, cost, and power consumption in various applications with different characteristics, e.g. request length, update ratios, read-and-modify ratios. Experimental results show that the optimized page and block size can achieve up to 15 times better performance than the conventional NFM configuration in various applications. The results can be used to optimize the system-level objectives of a system with specific applications, e.g. embedded systems with NFM chips, or predict the future direction of NFM.

The analysis of the relation between the quality of voice service and the quality of the wireless channel over a WiBro network (와이브로를 통한 음성서비스의 품질과 무선 채널 품질과의 통계적 상관관계 분석)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.719-726
    • /
    • 2014
  • This paper addresses quality of experience(QoE) and how to measure and evaluate QoE including its subjective aspects. Adopting the real measurements on the field, a various quality metric have been measured for VoIP(voice over IP) service provided through a wireless interface of WiBro(Wireless Broadband). By analyzing the measured values and correlation between the metrics, we attempt to find a method to evaluate QoE of the VoIP service in a objective way. As a result, it has been shown that QoE of the VoIP service through WiBro network has close relation to the packet-level end-to-end delay, and the delay has close relation to received signal strength indicator(RSSI).

A Study on the combining physical and virtual presence in e-commerce (전자상거래 효율화를 위한 채널통합방안 연구)

  • Cho, Won-Gil
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.69-86
    • /
    • 2004
  • In this paper, a conceptual framework describing the dynamics of click and mortar businesses is provided. It directs our attention to the many potential sources of synergy that are available to firms that choose to integrate e-commerce with their existing traditional forms of business. It further emphasizes the many actions that firms can take to minimize channel conflicts and help achieve the benefits of synergy. Finally, it describes four categories of synergy-related benefits from the integration of e-commerce with traditional businesses, including potential cost saving, gains due to enhanced differentiation, improved trust, and potential extensions into new markets. The utility of the framework was demonstrated using the case of an electronics retailer that has chosen to tightly integrate its large chain of retail stores with its Web-based electronic store. The framework was also used to develop a series of propositions that can guide future empirical research. The discussion points to the need to develop new types of metrics to better judge the contributions of e-commerce channels, and provides some guidance for future empirical research that can test whether, and under what conditions, integrated click and mortar business models work well. Thus, the purpose of this study is to present the combining physical and virtual presence in e-commerce.

  • PDF

Discriminant Metric Learning Approach for Face Verification

  • Chen, Ju-Chin;Wu, Pei-Hsun;Lien, Jenn-Jier James
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.742-762
    • /
    • 2015
  • In this study, we propose a distance metric learning approach called discriminant metric learning (DML) for face verification, which addresses a binary-class problem for classifying whether or not two input images are of the same subject. The critical issue for solving this problem is determining the method to be used for measuring the distance between two images. Among various methods, the large margin nearest neighbor (LMNN) method is a state-of-the-art algorithm. However, to compensate the LMNN's entangled data distribution due to high levels of appearance variations in unconstrained environments, DML's goal is to penalize violations of the negative pair distance relationship, i.e., the images with different labels, while being integrated with LMNN to model the distance relation between positive pairs, i.e., the images with the same label. The likelihoods of the input images, estimated using DML and LMNN metrics, are then weighted and combined for further analysis. Additionally, rather than using the k-nearest neighbor (k-NN) classification mechanism, we propose a verification mechanism that measures the correlation of the class label distribution of neighbors to reduce the false negative rate of positive pairs. From the experimental results, we see that DML can modify the relation of negative pairs in the original LMNN space and compensate for LMNN's performance on faces with large variances, such as pose and expression.

Algorithms for Efficient Digital Media Transmission over IoT and Cloud Networking

  • Stergiou, Christos;Psannis, Kostas E.;Plageras, Andreas P.;Ishibashi, Yutaka;Kim, Byung-Gyu
    • Journal of Multimedia Information System
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • In recent years, with the blooming of Internet of Things (IoT) and Cloud Computing (CC), researchers have begun to discover new methods of technological support in all areas (e.g. health, transport, education, etc.). In this paper, in order to achieve a type of network that will provide more intelligent media-data transfer new technologies were studied. Additionally, we have been studied the use of various open source tools, such as CC analyzers and simulators. These tools are useful for studying the collection, the storage, the management, the processing, and the analysis of large volumes of data. The simulation platform which have been used for our research is CloudSim, which runs on Eclipse software. Thus, after measuring the network performance with CloudSim, we also use the Cooja emulator of the Contiki OS, with the aim to confirm and access more metrics and options. More specifically, we have implemented a network topology from a small section of the script of CloudSim with Cooja, so that we can test a single network segment. The results of our experimental procedure show that there are not duplicated packets received during the procedure. This research could be a start point for better and more efficient media data transmission.

Which Code Changes Should You Review First?: A Code Review Tool to Summarize and Prioritize Important Software Changes

  • Song, Myoungkyu;Kwon, Young-Woo
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.255-262
    • /
    • 2017
  • In recent software development, repetitive code fragments (i.e., clones) are common due to the copy-and-paste programming practice, the framework-based development, or the reuse of same design patterns. Such similar code fragments are likely to introduce more bugs but are easily disregarded by a code reviewer or a programmer. In this paper, we present a code review tool to help code reviewers identify important code changes written by other programmers and recommend which changes need to be reviewed first. Specifically, to identify important code changes, our approach detects code clones across revisions and investigates them. Then, to help a code reviewer, our approach ranks the identified changes in accordance with several software quality metrics and statistics on those clones and changes. Furthermore, our approach allows the code reviewer to express their preferences during code review time. As a result, the code reviewer who has little knowledge of a code base can reduce his or her effort by reviewing the most significant changes that require an instant attention. To evaluate our approach, we integrated our approach with a modern IDE (e.g., Eclipse) as a plugin and then analyzed two third-party open source projects. The experimental results indicate that our approach can improve code reviewer's productivity.

Agent-based Adaptive Multimedia Streaming Considering Device Capabilities and Dynamic Network Conditions (무선 단말의 처리능력과 동적 네트워크 환경을 고려한 에이전트 기반의 적응적 멀티미디어 스트리밍 기법)

  • Jang, Minsoo;Seong, Chaemin;Kim, Jingu;Lim, Kyungshik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.353-362
    • /
    • 2015
  • In order to provide smart devices with high quality multimedia streaming services, an adaptive streaming technique over HTTP has been received much attention recently and the Dynamic Adaptive Streaming over HTTP (DASH) standard has been established. In DASH, however, the technique to select an appropriate quality of multimedia based on the performance metrics measured in a smart device might have some difficulties to reflect the capabilities of other neighboring smart devices and dynamic network conditions in real time. To solve the problem, this paper proposes a novel software agent approach, called DASH agent (DA), which gathers and analyzes the device capabilities and dynamic network conditions in real time and finally determines the highest achievable quality of segment to meet the best Quality of Experience (QoE) in current situations. The simulation results show that our approach provides higher quality of multimedia segments with less frequency of quality changes to lower quality of multimedia segments.

An approach for improving the performance of the Content-Based Image Retrieval (CBIR)

  • Jeong, Inseong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_2
    • /
    • pp.665-672
    • /
    • 2012
  • Amid rapidly increasing imagery inputs and their volume in a remote sensing imagery database, Content-Based Image Retrieval (CBIR) is an effective tool to search for an image feature or image content of interest a user wants to retrieve. It seeks to capture salient features from a 'query' image, and then to locate other instances of image region having similar features elsewhere in the image database. For a CBIR approach that uses texture as a primary feature primitive, designing a texture descriptor to better represent image contents is a key to improve CBIR results. For this purpose, an extended feature vector combining the Gabor filter and co-occurrence histogram method is suggested and evaluated for quantitywise and qualitywise retrieval performance criterion. For the better CBIR performance, assessing similarity between high dimensional feature vectors is also a challenging issue. Therefore a number of distance metrics (i.e. L1 and L2 norm) is tried to measure closeness between two feature vectors, and its impact on retrieval result is analyzed. In this paper, experimental results are presented with several CBIR samples. The current results show that 1) the overall retrieval quantity and quality is improved by combining two types of feature vectors, 2) some feature is better retrieved by a specific feature vector, and 3) retrieval result quality (i.e. ranking of retrieved image tiles) is sensitive to an adopted similarity metric when the extended feature vector is employed.

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6 (IPv6 기반의 사물인터넷 환경에서 악성 노드의 패킷 유실 공격 탐지 및 우회 기법 분석)

  • Choi, Jaewoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.655-659
    • /
    • 2016
  • In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.