• Title/Summary/Keyword: Eventually perfect

Search Result 15, Processing Time 0.021 seconds

Design of Fault-tolerant Mutual Exclusion Protocol in Asynchronous Distributed Systems (비동기적 분산 시스템에서 결함허용 상호 배제 프로토콜의 설계)

  • Park, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.182-189
    • /
    • 2010
  • This paper defines the quorum-based fault-tolerant mutual exclusion problem in a message-passing asynchronous system and determines a failure detector to solve the problem. This failure detector, which we call the modal failure detector star, and which we denote by $M^*$, is strictly weaker than the perfect failure detector P but strictly stronger than the eventually perfect failure detector ◇P. The paper shows that at any environment, the problem is solvable with $M^*$.

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction

  • Yang, Zhiyong;Li, Chunlin;Liu, Yanpei;Liu, Yunchang;Xu, Lijun
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2014
  • In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the detection process does not receive the heartbeat message in the expected time. The interaction model is then used to check the process further. The expected time is calculated using the exponential smoothing method. Exponential smoothing can be used to estimate the next arrival time not only in the random data, but also in the data of linear trends. It is proven that the new detector in the paper can eventually be a perfect detector.

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

Reform Measures of Distribution Structure to Promote Domestic Milk Consumption (국산 시유의 소비 증진을 위한 유통 구조 개선 방향)

  • Chung, Woon-Hyun
    • Journal of Dairy Science and Biotechnology
    • /
    • v.17 no.1
    • /
    • pp.32-38
    • /
    • 1999
  • Korean dairy industry is placed on the very critical situation with the progress of free trade marketing system internationally. To keep and improve the dairy food market, better measures are imperative for dairy industry. Especially, the milk distribution system is premodern to some extent, in comparison with both the production and the processing part of dairy industry. Reform measures for the promotion of domestic milk consumption by lowering the distribution cost are as follows. First, out-sourcing of the logistics department can decrease the circulation cost of milk. Secondly, milk should be packed into large-size package(more than 1 liter) to save both package and distribution cost. Thirdly, milk should be distributed from plant to consumers through the hygienic distribution system including perfect cold chain system, Above reform measures can not come true through the efforts taken by one company but through co-worker, concerted research, and joint in-vestment among dairy companies that can reduce the distribution cost and provide consumers with the best service, eventually resulting in the increment of milk consumption.

  • PDF

SOME NEW CLASSES OF ZERO-DIFFERENCE BALANCED FUNCTIONS AND RELATED CONSTANT COMPOSITION CODES

  • Sankhadip, Roy
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.6
    • /
    • pp.1327-1337
    • /
    • 2022
  • Zero-difference balanced (ZDB) functions can be applied to many areas like optimal constant composition codes, optimal frequency hopping sequences etc. Moreover, it has been shown that the image set of some ZDB functions is a regular partial difference set, and hence provides strongly regular graphs. Besides, perfect nonlinear functions are zero-difference balanced functions. However, the converse is not true in general. In this paper, we use the decomposition of cyclotomic polynomials into irreducible factors over 𝔽p, where p is an odd prime to generalize some recent results on ZDB functions. Also we extend a result introduced by Claude et al. [3] regarding zero-difference-p-balanced functions over 𝔽pn. Eventually, we use these results to construct some optimal constant composition codes.

Personal technique for definite repair of complete unilateral cleft lip: modified Millard technique

  • Han, Kihwan;Park, Jeongseob;Lee, Seongwon;Jeong, Woonhyeok
    • Archives of Craniofacial Surgery
    • /
    • v.19 no.1
    • /
    • pp.3-12
    • /
    • 2018
  • Background: Millard's rotation-advancement repair, which is used by many surgeons, can make a natural philtral column, but most surgeons use a modification of the rotation-advancement flap. The purpose of this article is to introduce a modification utilized by the authors and to provide detailed surgical procedure. Methods: We retrospectively reviewed 82 patients' medical records and presented surgical technique and outcomes. The main features of the authors' strategy are emphasizing horizontal length of the lip, orbicularis oris muscle duplication for improving the definition of the philtral column, overcorrection of domal portion than the non-cleft side in order to compensate for the recurrence during growth. Two judges rated two times the appearance of the patients' nose and lip using Asher-McDade aesthetic index. Intra- and interobserver reliabilities were determined using Cohen's kappa statistics. Results: All patients recovered eventually after surgery; however, two patients have a minor complications (wound infection in one patient, wound disruption due to trauma in the other patient). The improvement of the aesthetic results can be achieved with this modified Millard technique. Total mean scores of the Asher-McDade index was 2.08, fair to good appearance. The intraobserver reliabilities were substantial to almost perfect agreement and the interobserver reliabilities were moderate to almost perfect agreement. Conclusion: We modified Millard method for repair of complete unilateral cleft lip. The surgical outcomes were favorable in long-term follow-up. We hope our technique will serve as a guide for those new to the procedure.

A Study On Relationships between Election Problems of Coordinator Under Distributed Systems (분산시스템 환경에서 조정자 선출 문제들 간의 상관관계 연구)

  • Kim, Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.35-40
    • /
    • 2003
  • In this paper, I raise an issue regarding the relationships between the Election problem and the Consensus problem in asynchronous systems with unreliable failure detectors. First, I describe our system model, and then define Leader Election. After then, I show that the Election problem is harder to resolve than the Consensus problem. Each correct process eventually gets into the state in which it considers only one process to be a leader. Therefore a Perfect Failure Detector is the weakest failure detector which is sufficient to solve the Election. In order to show that the Election problem is harder to resolve than the Consensus problem, I utilize the Reduction protocol in this paper.

  • PDF

The Softest handoff Design using iterative decoding (Turbo Coding)

  • Yi, Byung-K.;Kim, Sang-G.;Picknoltz, Raymond-L.
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.76-84
    • /
    • 2000
  • Communication systems, including cell-based mobile communication systems, multiple satellite communication systems of multi-beam satellite systems, require reliable handoff methods between cell-to-cell, satellite-to-satellite of beam-to-team, respectively. Recent measurement of a CDMA cellular system indicates that the system is in handoff at about 35% to 70% of an average call period. Therefore, system reliability during handoff is one of the major system performance parameters and eventually becomes a factor in the overall system capacity. This paper presents novel and improved techniques for handoff in cellular communications, multi-beam and multi-satellite systems that require handoff during a session. this new handoff system combines the soft handoff mechanism currently implemented in the IS-95 CDMA with code and packet diversity combining techniques and an iterative decoding algorithm (Turbo Coding). the Turbo code introduced by Berrou et all. has been demonstrated its remarkable performance achieving the near Shannon channel capacity [1]. Recently. Turbo codes have been adapted as the coding scheme for the data transmission of the third generation international cellular communication standards : UTRA and CDMA 2000. Our proposed encoder and decoder schemes modified from the original Turbo code is suitable for the code and packet diversity combining techniques. this proposed system provides not only an unprecedented coding gain from the Turbo code and it iterative decoding, but also gain induced by the code and packet diversity combining technique which is similar to the hybrid Type II ARQ. We demonstrate performance improvements in AWGN channel and Rayleigh fading channel with perfect channel state information (CSI) through simulations for at low signal to noise ratio and analysis using exact upper bounding techniques for medium to high signal to noise ratio.

  • PDF

A Study on the Application of 3D Virtual Human in the prior stage of Design Works - With the emphasis on the determining design layout of a forklift truck (디자인 초기단계에서의 3차원 가상인간(Virtual Human) 활용에 관한 연구 - 지게차 레이아웃 결정 단계를 중심으로)

  • 김관명
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.294-303
    • /
    • 1999
  • With the breakthrough development of computing environment, the design phases have been changed a lot nowadays. In the case of prior phases of transportation design such as cars and forklift-trucks design, designers have depended on surveys and 2D line drawings for fixing a product layout and extracting ergonomic data. In this method, designers don't meet only the problem of reliability of measuring data but also, the problems of unknown situation of operators' fatigue and comfort in work situation. In these methods, it has much less creditability to have a 2D human model to check the real world motion due to the limitation of the 3 Dimension. Even though with a 2D human model, perfect layout is determined, it is still difficult to measure about comfort and fatigue for a user because it measuring an analysing method is static. The development of computer hardware and software have not only changed the flow in the social-wide range but also immerged design into Virtual Environment. In conventional design method, visualization and data transferring have been the main issues but, in virtual environment, determining of design layout and analysing ergonomic data with sophisticated feeling about comfort and fatigue are possible by using 3D virtual human. In this study, the general characteristics of virtual environment was discussed and the possibility of digital process of design was treated. For these studies, layout design for forklift-trucks was tested. Eventually, the merits of each design phase applied virtual environment are discussed.

  • PDF

Representation of China in Ha Jin's Works and the Controversy over Orientalism (하진의 중국재현과 오리엔탈리즘 논쟁)

  • LEE, Su Mee
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.191-214
    • /
    • 2015
  • Chinese American Writer, Ha Jin has been writing exclusively about the life in his native Communist China. His stories and poems are almost all about the Chinese people so far. In addition, the distinctive Chinese flavour and the inexorably repressive image of China in his works present an 'Other' to the American culture. Such kind of Chineseness can also be found in Ha Jin's works and his career as a writer. The continued demand for knowledge of China, which is created by China's increasingly important role in the globalized economy, sustains the country's position as an Other for America. In his early four novels, Ha Jin portrays a totally repressive image of Communist China, an image of which functions perfectly as a form of otherness for his American readers. In Ha Jin's portrayal, the Chinese masses are subjected to the Communist authority through its bureaucracy and state-economy mechanism, as well as through the godlike image of Mao Zedong. They are to follow the Communist conscience and subscribe to unity-in-difference. Deviation from the one-party rule is intolerable. In each of the novels, Ha Jin presents a specific system of repression. In In the Pond, confrontation against Party authority is contained by a process of complicity. In Waiting, the Party's power is upheld through a system of surveillance in which people act as agents, resulting in a web of power which paralyses love. The Crazed illustrates a play of power by Party officials which, against the backdrop of the Tiananmen Square Massacre, is full of craze itself, driving people either out of sanity or out of the country. War Trash exposes the Communist power's repression to the extreme by presenting a case of dishonour in those whose life is debased as trash by the Party. The repressive image of China produced in these stories, which span over half a century, makes Ha Jin's China a perfect Other for the West. To sum up, Ha Jin's novels construct a repressive image of China. In his novels, Ha Jin exposes the working of repression in particular systems. Through these systems, he problematizes the notion of personal autonomy for Chinese people and proposes for his western/American readers a solution which eventually turns into a re-presentation of American hegemony.