• Title/Summary/Keyword: Exploit

Search Result 1,236, Processing Time 0.023 seconds

Channel Prediction-Based Channel Allocation Scheme for Multichannel Cognitive Radio Networks

  • Lee, Juhyeon;Park, Hyung-Kun
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.209-216
    • /
    • 2014
  • Cognitive radio (CR) has been proposed to solve the spectrum utilization problem by dynamically exploiting the unused spectrum. In CR networks, a spectrum selection scheme is an important process to efficiently exploit the spectrum holes, and an efficient channel allocation scheme must be designed to minimize interference to the primary network as well as to achieve better spectrum utilization. In this paper, we propose a multichannel selection algorithm that uses spectrum hole prediction to limit the interference to the primary network and to exploit channel characteristics in order to enhance channel utilization. The proposed scheme considers both the interference length and the channel capacity to limit the interference to primary users and to enhance system performance. By using the proposed scheme, channel utilization is improved whereas the system limits the collision rate of the CR packets.

Novel MIMO Communication Scheme for Enhanced Indoor Performance in Distributed Antenna Systems

  • Cho, Bong-Youl;Kim, Jin-Young
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.4
    • /
    • pp.263-269
    • /
    • 2010
  • Multiple input multiple output (MIMO) has been considered one of the key enablers of broadband wireless communications. The indoor environment is known to be favorable to ensure both high rank property and high signal-to-interference/noise ratio (SINR) to fully exploit MIMO spatial multiplexing (SM) gain. In this paper, we describe several practical deployment cases where repeater links (or relay links), such as those present with an indoor distributed antenna system (DAS), can act as keyholes to degenerate the rank property of MIMO communications. In this case, we cannot exploit MIMO SM gain in indoor environment. We propose a novel MIMO communication scheme which uses simple converter in the devices in repeater links to resolve the rank degeneration issue and to ensure MIMO SM gain in highly MIMO-favorable indoor environment. MIMO SM is possible over the indoor DAS with single cable line through use of simple converters, which enables practical deployment in real fields.

Phonological Process and Word Recognition in Continuous Speech: Evidence from Coda-neutralization (음운 현상과 연속 발화에서의 단어 인지 - 종성중화 작용을 중심으로)

  • Kim, Sun-Mi;Nam, Ki-Chun
    • Phonetics and Speech Sciences
    • /
    • v.2 no.2
    • /
    • pp.17-25
    • /
    • 2010
  • This study explores whether Koreans exploit their native coda-neutralization process when recognizing words in Korean continuous speech. According to the phonological rules in Korean, coda-neutralization process must come before the liaison process, as long as the latter(i.e. liaison process) occurs between 'words', which results in liaison-consonants being coda-neutralized ones such as /b/, /d/, or /g/, rather than non-neutralized ones like /p/, /t/, /k/, /ʧ/, /ʤ/, or /s/. Consequently, if Korean listeners use their native coda-neutralization rules when processing speech input, word recognition will be hampered when non-neutralized consonants precede vowel-initial targets. Word-spotting and word-monitoring tasks were conducted in Experiment 1 and 2, respectively. In both experiments, listeners recognized words faster and more accurately when vowel-initial target words were preceded by coda-neutralized consonants than when preceded by coda non-neutralized ones. The results show that Korean listeners exploit the coda-neutralization process when processing their native spoken language.

  • PDF

Category Factor Based Feature Selection for Document Classification

  • Kang Yun-Hee
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.26-30
    • /
    • 2005
  • According to the fast growth of information on the Internet, it is becoming increasingly difficult to find and organize useful information. To reduce information overload, it needs to exploit automatic text classification for handling enormous documents. Support Vector Machine (SVM) is a model that is calculated as a weighted sum of kernel function outputs. This paper describes a document classifier for web documents in the fields of Information Technology and uses SVM to learn a model, which is constructed from the training sets and its representative terms. The basic idea is to exploit the representative terms meaning distribution in coherent thematic texts of each category by simple statistics methods. Vector-space model is applied to represent documents in the categories by using feature selection scheme based on TFiDF. We apply a category factor which represents effects in category of any term to the feature selection. Experiments show the results of categorization and the correlation of vector length.

  • PDF

Study on Spin-off Business Model for the Exploitation of Intellectual Property at University in Vietnam

  • Nguyen, Quoc Cuong;Tran, Thi Huyen;Kwon, HyukDong
    • International journal of advanced smart convergence
    • /
    • v.11 no.1
    • /
    • pp.48-54
    • /
    • 2022
  • Promote the application ofscientific research and technological developmentresultsto production and social life; The commercialization of scientific and technological products through the science and technology market is an effective method to exploit intellectual property at universities and research institutes. Spin-off is a popular business model in developed countriesto deploy and commercialize scientific and technologicalresearch results. However, in Vietnam, this concept is not popular as well as the number of spin-off businesses is not much and does not work effectively. This article focuses on clarifying the shortcomings and difficulties in establishing spin-off businesses in universities, thereby proposing solutions to develop spin-off businesses to exploit assets intellect at universities in Vietnam

The Effect of Cloud-based IT Architecture on IT Exploration and Exploitation: Enabling Role of Modularity and Virtuality

  • Insoo Son;Dongwon Lee;Gwanhoo Lee;Youngjin Yoo
    • Asia pacific journal of information systems
    • /
    • v.28 no.4
    • /
    • pp.240-257
    • /
    • 2018
  • In today's turbulent business landscape, a firm's ability to explore new IT capabilities and exploit current ones is essential for enabling organizational agility and achieving high organizational performance. We propose IT exploration and exploitation as two critical organizational learning processes that are essential for gaining and sustaining competitive advantages. However, it remains unclear how the emerging cloud-based IT architecture affects an organization's ability to explore and exploit its IT capabilities. We conceptualize modularity and virtuality as two critical dimensions of emerging cloud-based IT architecture and investigate how they affect IT exploration and exploitation. We test our hypotheses using data obtained from our field survey of IT managers. We find that modularity is positively associated with both exploration and exploitation whereas virtuality is positively associated with exploration, but not with exploitation. We also find that the effect of modularity on exploitation is stronger than its effect on exploration.

Male Mating Strategies through Manipulation of Female-perceived Predation Risk: A Minireview and a Hypothesis

  • Han, Chang-S.;Jablonski, Piotr G.
    • Journal of Ecology and Environment
    • /
    • v.31 no.1
    • /
    • pp.1-7
    • /
    • 2008
  • In this minireview we focus on how males may exploit female's sensitivity to predation risk in the context of mating. It has been shown in studies on guppies and jumping spiders that in response to altered female behaviors, which are adaptations to the unfavorable environment and a consequence of females' higher sensitivity to predator's presence as well as females' higher predation risk, males can adopt condition-dependent mating tactics. It appears that in such cases males do not modify their reproductive behavior directly in response to their own perception of predation risk, but indirectly in response to changes in female behavior induced by predator presence. It has also been recently shown in crabs that males can exploit female behavior by creating safer habitat spots, which increases the male mating success. Hence all the evidence suggests that males not only respond to female sensitivity to the natural variation in predation risk, but that males can also exploit female behavior by altering the environment. As a logical extension of these findings, we present a hypothesis that in certain conditions males can manipulate the environment in order to increase the predation risk and to induce female behaviors that enhance the male's mating success with the increased predation risk. We propose that such a manipulation to increase predation risk is expected to evolve in males of species with a strong sexual conflict and female-biased predation risk. Although empirical evidence has not been yet shown, initial observations in a water strider species in Korea, Gerris gracilicornis, seem to support this hypothesis.

A new approach to short term load forecasting (전력계통부하예측에 관한 연구)

  • 양흥석
    • 전기의세계
    • /
    • v.29 no.4
    • /
    • pp.260-264
    • /
    • 1980
  • In this paper, a new algorithm is derived for short term load forecasting. The load model is represented by the state variable form to exploit the Kalman filter techniques. The suggested model has advantages that it is unnecessarty to obtain the coefficients of the harmonic components and its coefficients are not explicitly included in the model. Case studies were carried out for the hourly power demand forecasting of the Korea electrical system.

  • PDF