• 제목/요약/키워드: Eventually perfect

검색결과 15건 처리시간 0.02초

비동기적 분산 시스템에서 결함허용 상호 배제 프로토콜의 설계 (Design of Fault-tolerant Mutual Exclusion Protocol in Asynchronous Distributed Systems)

  • 박성훈
    • 한국산학기술학회논문지
    • /
    • 제11권1호
    • /
    • pp.182-189
    • /
    • 2010
  • 본 논문에서는 비동기적 분산시스템에서 고장 추적 장치를 이용한 상호배제의 문제를 서술하고 이러한 문제를 해결하는 가장 약한 고장 추적 장치를 결정하고자 한다. 이를 위해서 $M^*$라고 정의한 modal failure detector star 고장 추적 장치를 정의하고 $M^*$를 이용해서 상호배제 문제는 비동기적 분산 시스템에서 해결 가능함을 보인다. $M^*$는 perfect failure detector P보다 확실히 약하며 eventually perfect failure detector ◇P보다는 강한 고장추적 장치이다. 본 논문에서는 어떤 환경 안에서 이러한 문제가 해결 가능함을 보인다.

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction

  • Yang, Zhiyong;Li, Chunlin;Liu, Yanpei;Liu, Yunchang;Xu, Lijun
    • Journal of Computing Science and Engineering
    • /
    • 제8권1호
    • /
    • pp.17-24
    • /
    • 2014
  • In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the detection process does not receive the heartbeat message in the expected time. The interaction model is then used to check the process further. The expected time is calculated using the exponential smoothing method. Exponential smoothing can be used to estimate the next arrival time not only in the random data, but also in the data of linear trends. It is proven that the new detector in the paper can eventually be a perfect detector.

Survey on Physical Layer Security in Downlink Networks

  • Abbas, Mohammed Adil;Hong, Jun-Pyo
    • Journal of information and communication convergence engineering
    • /
    • 제15권1호
    • /
    • pp.14-20
    • /
    • 2017
  • In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the availability of CSI of eavesdroppers significantly affects not only the beamforming strategy but also the user scheduling. Eventually, we provide intuitive information on the effect of CSI on the secrecy performance by considering three scenarios: perfect, imperfect, and absence of eavesdropper's CSI at the BS.

국산 시유의 소비 증진을 위한 유통 구조 개선 방향 (Reform Measures of Distribution Structure to Promote Domestic Milk Consumption)

  • 정운현
    • Journal of Dairy Science and Biotechnology
    • /
    • 제17권1호
    • /
    • pp.32-38
    • /
    • 1999
  • Korean dairy industry is placed on the very critical situation with the progress of free trade marketing system internationally. To keep and improve the dairy food market, better measures are imperative for dairy industry. Especially, the milk distribution system is premodern to some extent, in comparison with both the production and the processing part of dairy industry. Reform measures for the promotion of domestic milk consumption by lowering the distribution cost are as follows. First, out-sourcing of the logistics department can decrease the circulation cost of milk. Secondly, milk should be packed into large-size package(more than 1 liter) to save both package and distribution cost. Thirdly, milk should be distributed from plant to consumers through the hygienic distribution system including perfect cold chain system, Above reform measures can not come true through the efforts taken by one company but through co-worker, concerted research, and joint in-vestment among dairy companies that can reduce the distribution cost and provide consumers with the best service, eventually resulting in the increment of milk consumption.

  • PDF

SOME NEW CLASSES OF ZERO-DIFFERENCE BALANCED FUNCTIONS AND RELATED CONSTANT COMPOSITION CODES

  • Sankhadip, Roy
    • 대한수학회보
    • /
    • 제59권6호
    • /
    • pp.1327-1337
    • /
    • 2022
  • Zero-difference balanced (ZDB) functions can be applied to many areas like optimal constant composition codes, optimal frequency hopping sequences etc. Moreover, it has been shown that the image set of some ZDB functions is a regular partial difference set, and hence provides strongly regular graphs. Besides, perfect nonlinear functions are zero-difference balanced functions. However, the converse is not true in general. In this paper, we use the decomposition of cyclotomic polynomials into irreducible factors over 𝔽p, where p is an odd prime to generalize some recent results on ZDB functions. Also we extend a result introduced by Claude et al. [3] regarding zero-difference-p-balanced functions over 𝔽pn. Eventually, we use these results to construct some optimal constant composition codes.

Personal technique for definite repair of complete unilateral cleft lip: modified Millard technique

  • Han, Kihwan;Park, Jeongseob;Lee, Seongwon;Jeong, Woonhyeok
    • 대한두개안면성형외과학회지
    • /
    • 제19권1호
    • /
    • pp.3-12
    • /
    • 2018
  • Background: Millard's rotation-advancement repair, which is used by many surgeons, can make a natural philtral column, but most surgeons use a modification of the rotation-advancement flap. The purpose of this article is to introduce a modification utilized by the authors and to provide detailed surgical procedure. Methods: We retrospectively reviewed 82 patients' medical records and presented surgical technique and outcomes. The main features of the authors' strategy are emphasizing horizontal length of the lip, orbicularis oris muscle duplication for improving the definition of the philtral column, overcorrection of domal portion than the non-cleft side in order to compensate for the recurrence during growth. Two judges rated two times the appearance of the patients' nose and lip using Asher-McDade aesthetic index. Intra- and interobserver reliabilities were determined using Cohen's kappa statistics. Results: All patients recovered eventually after surgery; however, two patients have a minor complications (wound infection in one patient, wound disruption due to trauma in the other patient). The improvement of the aesthetic results can be achieved with this modified Millard technique. Total mean scores of the Asher-McDade index was 2.08, fair to good appearance. The intraobserver reliabilities were substantial to almost perfect agreement and the interobserver reliabilities were moderate to almost perfect agreement. Conclusion: We modified Millard method for repair of complete unilateral cleft lip. The surgical outcomes were favorable in long-term follow-up. We hope our technique will serve as a guide for those new to the procedure.

분산시스템 환경에서 조정자 선출 문제들 간의 상관관계 연구 (A Study On Relationships between Election Problems of Coordinator Under Distributed Systems)

  • Kim, Yoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.35-40
    • /
    • 2003
  • 분산시스템 환경에서, 흩어져 있는 다양한 형태의 자원들을 통제하고 관리하기 위해서는 분산된 여러 프로세스들 가운데 조정자(coordinator)로서의 역할을 담당할 특별한 프로세스를 필요로 한다. 이러한 조정자 프로세스를 통상 리더(leader)라고 부르며 리더를 선출하기 위한 알고리즘은 신뢰성있는 분산시스템을 구축하는 데 필수적인 중요한 요소가 된다. 이 논문에서는 특별히 failure detector(FD)를 구현한 비동기 분산시스템 환경에서 선출 문제 및 컨센서스 문제 간의 상관관계를 통해 제기되는 문제를 다루고자 한다. 먼저, 시스템 모델을 정의하고 그 다음으로 리더 선출을 설명한 후 마지막으로 축소 프로토콜을 이용하여 선출 문제가 컨센서스 문제에 비해 상대적으로 어려움을 증명하도록 할 것이다.

  • PDF

The Softest handoff Design using iterative decoding (Turbo Coding)

  • Yi, Byung-K.;Kim, Sang-G.;Picknoltz, Raymond-L.
    • Journal of Communications and Networks
    • /
    • 제2권1호
    • /
    • pp.76-84
    • /
    • 2000
  • Communication systems, including cell-based mobile communication systems, multiple satellite communication systems of multi-beam satellite systems, require reliable handoff methods between cell-to-cell, satellite-to-satellite of beam-to-team, respectively. Recent measurement of a CDMA cellular system indicates that the system is in handoff at about 35% to 70% of an average call period. Therefore, system reliability during handoff is one of the major system performance parameters and eventually becomes a factor in the overall system capacity. This paper presents novel and improved techniques for handoff in cellular communications, multi-beam and multi-satellite systems that require handoff during a session. this new handoff system combines the soft handoff mechanism currently implemented in the IS-95 CDMA with code and packet diversity combining techniques and an iterative decoding algorithm (Turbo Coding). the Turbo code introduced by Berrou et all. has been demonstrated its remarkable performance achieving the near Shannon channel capacity [1]. Recently. Turbo codes have been adapted as the coding scheme for the data transmission of the third generation international cellular communication standards : UTRA and CDMA 2000. Our proposed encoder and decoder schemes modified from the original Turbo code is suitable for the code and packet diversity combining techniques. this proposed system provides not only an unprecedented coding gain from the Turbo code and it iterative decoding, but also gain induced by the code and packet diversity combining technique which is similar to the hybrid Type II ARQ. We demonstrate performance improvements in AWGN channel and Rayleigh fading channel with perfect channel state information (CSI) through simulations for at low signal to noise ratio and analysis using exact upper bounding techniques for medium to high signal to noise ratio.

  • PDF

디자인 초기단계에서의 3차원 가상인간(Virtual Human) 활용에 관한 연구 - 지게차 레이아웃 결정 단계를 중심으로 (A Study on the Application of 3D Virtual Human in the prior stage of Design Works - With the emphasis on the determining design layout of a forklift truck)

  • 김관명
    • 디자인학연구
    • /
    • 제12권4호
    • /
    • pp.294-303
    • /
    • 1999
  • 최근 들어 컴퓨터 환경의 비약적인 발전에 따라 디자인 과정도 크게 변화하고 있다. 자동차나 지게차 등과 같은 운송기기의 디자인이나, 작업장의 디자인의 경우 초기 디자인 과정중에서 레이아웃을 결정하고 인체 공학적인 데이터를 추출함에 있어서 설문이나 2D의 라인드로잉에 의존해 오고 있다. 이러한 방법의 문제점은 신뢰성이 많이 떨어질 뿐만 아니라 2D 마네킨을 사용하므로써 실제 사각으로 움직이는 인간 몸체의 움직임이 고려되지 못하며, 움직임 범위가 확정된다 하더라도 그 범위내에서의 움직임에 대한 인체의 피로도나 안락도 정도에 관해서는 전혀 측정할 수가 없었다. 컴퓨터 하드웨어와 소프트웨어의 비약적인 발전은 일반 생활환경 뿐 아니라 디자인환경에서도 가상환경 (Virtual Environment) 이라는 큰 흐름을 가져 왔다. 특히 기존의 컴퓨터를 응용한 디자인에서는 Visualization이나, CAD&CAM을 통한 데이터의 교환이 주된 관심사였으나, 최근 들어 빠르게 소개되고 있는 가상환경에서는 디자인초기단계에서 디자인 레이아웃 결정 뿐 아니라 사용자가 느끼게 되는 미세한 감각까지도 데이터화할 수 있게되었다. 본 연구에서는 이와 같이 디자인에서 사용할 수 있는 가상환경의 일반적인 특성를 밝히고, 초기 디자인 과정에서 디지털화된 환경의 이용가능성을 모색하였다. 이러한 연구는 실제 지게차 디자인의 사례를 통하여 살펴보았으며 이 사례연구를 통하여 디자이너가 활용할 수 있는 가능성과 문제점이 무엇인지 밝혔다. 마지막으로 3차원 가상인간의 적용을 통해 초기 디자인 단계에서 새롭게 적용될 수 있는 디지털화 디자인 작업의 잇점에 대하여 논의 하였다.

  • PDF

하진의 중국재현과 오리엔탈리즘 논쟁 (Representation of China in Ha Jin's Works and the Controversy over Orientalism)

  • 이수미
    • 비교문화연구
    • /
    • 제38권
    • /
    • pp.191-214
    • /
    • 2015
  • Chinese American Writer, Ha Jin has been writing exclusively about the life in his native Communist China. His stories and poems are almost all about the Chinese people so far. In addition, the distinctive Chinese flavour and the inexorably repressive image of China in his works present an 'Other' to the American culture. Such kind of Chineseness can also be found in Ha Jin's works and his career as a writer. The continued demand for knowledge of China, which is created by China's increasingly important role in the globalized economy, sustains the country's position as an Other for America. In his early four novels, Ha Jin portrays a totally repressive image of Communist China, an image of which functions perfectly as a form of otherness for his American readers. In Ha Jin's portrayal, the Chinese masses are subjected to the Communist authority through its bureaucracy and state-economy mechanism, as well as through the godlike image of Mao Zedong. They are to follow the Communist conscience and subscribe to unity-in-difference. Deviation from the one-party rule is intolerable. In each of the novels, Ha Jin presents a specific system of repression. In In the Pond, confrontation against Party authority is contained by a process of complicity. In Waiting, the Party's power is upheld through a system of surveillance in which people act as agents, resulting in a web of power which paralyses love. The Crazed illustrates a play of power by Party officials which, against the backdrop of the Tiananmen Square Massacre, is full of craze itself, driving people either out of sanity or out of the country. War Trash exposes the Communist power's repression to the extreme by presenting a case of dishonour in those whose life is debased as trash by the Party. The repressive image of China produced in these stories, which span over half a century, makes Ha Jin's China a perfect Other for the West. To sum up, Ha Jin's novels construct a repressive image of China. In his novels, Ha Jin exposes the working of repression in particular systems. Through these systems, he problematizes the notion of personal autonomy for Chinese people and proposes for his western/American readers a solution which eventually turns into a re-presentation of American hegemony.