• Title/Summary/Keyword: Information access

Search Result 10,231, Processing Time 0.033 seconds

Class Gated Dynamic Bandwidth Allocation Algorithm for supporting QoS in the EPON (EPON 시스템에서 효율적인 QoS 제공을 위한 Class Gated 동적 대역 할당 알고리즘)

  • Hwang Jun-Ho;Kim Hyo-Won;Yoo Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.94-103
    • /
    • 2006
  • Ethernet passive optical network (EPON) has drawn many attention as a promising access network technology for FTTH because it can provide a high bandwidth with a low cost. Since the uplink bandwidth in the EPON system is shared by many users, it is necessary for an EPON system to have an efficient bandwidth allocation mechanism. To support QoS in EPON, the previous bandwidth allocation schemes employ strict priority queueing (SPQ). Since SPQ gives unlimited priority to higher service class, the QoS of lower service classes gets worse. In this paper, we propose Class Gated DBA (Dynamic Bandwidth Allocation) algorithm in which the bandwidth is requested / granted in a service class basis. To avoid the monopoly in bandwidth usage by higher classes the maximum bandwidth that is allocate to each service class is limited (fairness between services classes). In addition, to avoid the monopoly in bandwidth usage by some particular users, each ONU runs fairness bandwidth allocation algorithm within each service classes. Through computer simulations, it is verified that the proposed algorithm achieves a good level of QoS, and at the same time maintains a good level of fairness between both service classes and users.

A Study on the etching mechanism of $CeO_2$ thin film by high density plasma (고밀도 플라즈마에 의한 $CeO_2$ 박막의 식각 메커니즘 연구)

  • Oh, Chang-Seok;Kim, Chang-Il
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.12
    • /
    • pp.8-13
    • /
    • 2001
  • Cerium oxide ($CeO_2$) thin film has been proposed as a buffer layer between the ferroelectric thin film and the Si substrate in Metal-Ferroelectric-Insulator-Silicon (MFIS) structures for ferroelectric random access memory (FRAM) applications. In this study, $CeO_2$ thin films were etched with $Cl_2$/Ar gas mixture in an inductively coupled plasma (ICP). Etch properties were measured for different gas mixing ratio of $Cl_2$($Cl_2$+Ar) while the other process conditions were fixed at RF power (600 W), dc bias voltage (-200 V), and chamber pressure (15 mTorr). The highest etch rate of $CeO_2$ thin film was 230 ${\AA}$/min and the selectivity of $CeO_2$ to $YMnO_3$ was 1.83 at $Cl_2$($Cl_2$+Ar gas mixing ratio of 0.2. The surface reaction of the etched $CeO_2$ thin films was investigated using x-ray photoelectron spectroscopy (XPS) analysis. There is a Ce-Cl bonding by chemical reaction between Ce and Cl. The results of secondary ion mass spectrometer (SIMS) analysis were compared with the results of XPS analysis and the Ce-Cl bonding was monitored at 176.15 (a.m.u). These results confirm that Ce atoms of $CeO_2$ thin films react with chlorine and a compound such as CeCl remains on the surface of etched $CeO_2$ thin films. These products can be removed by Ar ion bombardment.

  • PDF

Giga WDM-PON based on ASE Injection R-SOA (ASE 주입형 R-SOA 기반 기가급 WDM-PON 연구)

  • Shin Hong-Seok;Hyun Yoo-Jeong;Lee Kyung-Woo;Park Sung-Bum;Shin Dong-Jae;Jung Dae-Kwang;Kim Seung-Woo;Yun In-Kuk;Lee Jeong-Seok;Oh Yun-Je;Park Jin-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.35-44
    • /
    • 2006
  • Reflective semiconductor optical amplifiers(R-SOAs) were designed with high gain, wide optical bandwidth, high thermal reliability and wide modulation bandwidth in TO-can package for the transmitter of wavelength division multiplexed-passive optical network(WDM-PON) application. Double trench structure and current block layer were introduced in designing the active layer of R-SOA to enable high speed modulation. The injection power requirement and the viable temperature range of WDM-PON system are experimentally analysed in based on Amplified Spontaneous Emission(ASE)-injected R-SOAs. The effect of the different injection spectrum in the gain-saturated R-SOA was experimentally characterized based on the measurements of excessive intensity noise, Q factor, and BER. The proposed spectral pre-composition method reduces the bandwidth of injection source below the AWG bandwidth and thereby avoids spectrum distortion impeding the intensity noise reduction originated from the amplitude squeezing.

An Improvement of Performance for Data Downstream in IEEE 802.11x Wireless LAN Networks (IEEE 802.11x 무선 랜에서의 데이터 다운스트림 성능 향상)

  • Kim, Ji-Hong;Kim, Yong-Hyun;Hong, Youn-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.149-158
    • /
    • 2006
  • We proposed a method for improving a performance of TCP downstream between a desktop PC as a fixed host and a PDA as a mobile host in a wired and wireless network based on IEEE 802.11x wireless LAN. With data transmission between these heterogeneous terminals a receiving time during downstream is slower than that during upstream by 20% at maximum. The reason is that their congestion window size will be oscillated due to a significantly lower packet processing rate at receiver compared to a packet sending rate at sender. Thus it will cause to increase the number of control packets to negotiate their window size. To mitigate these allergies, we proposed two distinct methods. First, by increasing a buffer size of a PDA at application layer an internal processing speed of a socket receive buffer of TCP becomes faster and then the window size is more stable. However, a file access time in a PDA is kept nearly constant as the buffer size increases. With the buffer size of 32,768bytes the receiving time is faster by 32% than with that of 512bytes. Second, a delay between packets to be transmitted at sender should be given. With an inter-packet delay of 5ms at sender a resulting receiving time is faster by 7% than without such a delay.

MAC Schemes for Best Effort Service in Wireless MAN: Design and Performance Analysis (무선 MAN에서 Best Effort 서비스를 위한 MAC 방식의 설계 및 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.128-140
    • /
    • 2006
  • In the IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple services. Among the service classes supported between the base station and subscriber stations in the wireless MAN, the best effort service class is ranked on the lowest position in priority and is assisted by a MAC scheme based on reservation ALOHA. The wireless MAN standard, however, does not reveal every detail of the MAC scheme but only describes the skeleton of the MAC scheme. Focusing on the amount of resource that a subscriber demands by a request and the amount of resource that the base grants to a request we thus present a number of resource demand rules and resource grant rules. Also, we construct a candidate MAC scheme by implanting a pair of resource demand and grant rules into the skeleton of the MAC scheme. Meanwhile a difficult situation for the best effort service is expected wherein only scarce resource is available after most of the resource is already preempted by other services. Perceiving such a situation, we evaluate the throughput and delay performance of each candidate MAC scheme. Especially we develop an analytical method to approximately calculate the throughput in the saturated environment. From the numerical results, we observe that the candidate MAC scheme which adopts the non-gated exhaustive demand rule paired with the full grant rule attains superior performance at the expense of the fairness.

Eye Tracking Using Neural Network and Mean-shift (신경망과 Mean-shift를 이용한 눈 추적)

  • Kang, Sin-Kuk;Kim, Kyung-Tai;Shin, Yun-Hee;Kim, Na-Yeon;Kim, Eun-Yi
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.56-63
    • /
    • 2007
  • In this paper, an eye tracking method is presented using a neural network (NN) and mean-shift algorithm that can accurately detect and track user's eyes under the cluttered background. In the proposed method, to deal with the rigid head motion, the facial region is first obtained using skin-color model and con-nected-component analysis. Thereafter the eye regions are localized using neural network (NN)-based tex-ture classifier that discriminates the facial region into eye class and non-eye class, which enables our method to accurately detect users' eyes even if they put on glasses. Once the eye region is localized, they are continuously and correctly tracking by mean-shift algorithm. To assess the validity of the proposed method, it is applied to the interface system using eye movement and is tested with a group of 25 users through playing a 'aligns games.' The results show that the system process more than 30 frames/sec on PC for the $320{\times}240$ size input image and supply a user-friendly and convenient access to a computer in real-time operation.

A Consensus Plan for Action to Improve Access to Cancer Care in the Association of Southeast Asian Nations (ASEAN) Region

  • Woodward, Mark
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.19
    • /
    • pp.8521-8526
    • /
    • 2014
  • In many countries of the Association of Southeast Asian Nations (ASEAN), cancer is an increasing problem due to ageing and a transition to Western lifestyles. Governments have been slow to react to the health consequences of these socioeconomic changes, leading to the risk of a cancer epidemic overwhelming the region. A major limitation to motivating change is the paucity of high-quality data on cancer, and its socioeconomic repercussions, in ASEAN. Two initiatives have been launched to address these issues. First, a study of over 9000 new cancer patients in ASEAN - the ACTION study - which records information on financial difficulties, as well as clinical outcomes, subsequent to the diagnosis. Second, a series of roundtable meetings of key stakeholders and experts, with the broad aim of producing advice for governments in ASEAN to take appropriate account of issues relating to cancer, as well as to generate knowledge and interest through engagement with the media. An important product of these roundtables has been the Jakarta Call to Action on Cancer Control. The growth and ageing of populations is a global challenge for cancer services. In the less developed parts of Asia, and elsewhere, these problems are compounded by the epidemiological transition to Western lifestyles and lack of awareness of cancer at the government level. For many years, health services in less developed countries have concentrated on infectious diseases and mother-and-child health; despite a recent wake-up call (United Nations, 2010), these health services have so far failed to allow for the huge increase in cancer cases to come. It has been estimated that, in Asia, the number of new cancer cases per year will grow from 6.1 million in 2008 to 10.6 million in 2030 (Sankaranarayanan et al., 2014). In the countries of the Association of Southeast Asian Nations (ASEAN), corresponding figures are 770 thousand in 2012 (Figure 1), rising to 1.3 million in 2030 (Ferlay et al., 2012). ASEAN consists of Brunei Darussalam, Cambodia, Indonesia, Lao, Malaysia, Myanmar, the Philippines, Singapore, Thailand and Viet Nam. It, thus, includes low- and middle-income countries where the double whammy of infectious and chronic diseases will pose an enormous challenge in allocating limited resources to competing health issues. Cancer statistics, even at the sub-national level, only tell part of the story. Many individuals who contract cancer in poor countries have no medical insurance and no, or limited, expectation of public assistance. Whilst any person who has a family member with cancer can expect to bear some consequential burden of care or expense, in a poor family in a poor environment the burden will surely be greater. This additional burden from cancer is rarely considered, and even more rarely quantified, even in developed nations.

A Coexistence Mitigation Scheme in IEEE 802.15.4-based WBAN (IEEE 802.15.4 기반 WBAN의 공존 문제 완화 기법)

  • Choi, Jong-hyeon;Kim, Byoung-seon;Cho, Jin-sung
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.1-11
    • /
    • 2015
  • WBAN(Wireless Body Area Network) operating around the human body aims at medical and non-medical service at the same time. and it is the short-range communication technology requiring low-power, various data rate and high reliability. Various studies is performing for IEEE 802.15.4, because IEEE 802.15.4 can provide high compatibility for operate WBAN among communication standard satisfiable these requirements. Meanwhile, in the case of coexisting many IEEE 802.15.4-based WBAN, signal interference and collision are the main cause that is decreasing data reliability. but IEEE 802.15.4 Standard does not consider about coexistence of many networks. so it needs improvement. In this paper, To solve about this problem, identify coexistence problem of IEEE 802.15.4-based WBAN by preliminary experiments. and propose a scheme to mitigate the reliability decrease at multiple coexistence WBAN. The proposed scheme can be classified in two steps. The first step is avoidance to collision on the CFP through improving data transmission. The second step is mitigation collision through converting channel access method. Proposed scheme is verified the performance by performing comparison experiment with Standard-based WBAN.

An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain (이중 해쉬체인을 이용한 계층적 다중 처리를 위한 효율적인 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.271-278
    • /
    • 2015
  • Recently, bit data is difficult to easily collect the desired data because big data is collected via the Internet. Big data is higher than the rate at which the data type and the period of time for which data is collected depending on the size of data increases. In particular, since the data of all different by the intended use and the type of data processing accuracy and computational cost is one of the important items. In this paper, we propose data processing method using a dual-chain in a manner to minimize the computational cost of the data when data is correctly extracted at the same time a multi-layered process through the desired number of the user and different kinds of data on the Internet. The proposed scheme is classified into a hierarchical data in accordance with the intended use and method to extract various kinds of data. At this time, multi-processing and tie the data hash with the double chain to enhance the accuracy of the reading. In addition, the proposed method is to organize the data in the hash chain for easy access to the hierarchically classified data and reduced the cost of processing the data. Experimental results, the proposed method is the accuracy of the data on average 7.8% higher than conventional techniques, processing costs were reduced by 4.9% of the data.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF