• Title/Summary/Keyword: Information input algorithm

Search Result 2,444, Processing Time 0.033 seconds

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO

  • Mohaisen, Manar
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.354-369
    • /
    • 2015
  • Recently, there has been an increasing demand of high data rates services, where several multiuser multiple-input multiple-output (MU-MIMO) techniques were introduced to meet these demands. Among these techniques, vector perturbation combined with linear precoding techniques, such as zero-forcing and minimum mean-square error, have been proven to be efficient in reducing the transmit power and hence, perform close to the optimum algorithm. In this paper, we review several fixed-complexity vector perturbation techniques and investigate their performance under both perfect and imperfect channel knowledge at the transmitter. Also, we investigate the combination of block diagonalization with vector perturbation outline its merits.

On Compensating Nonlinear Distortions of an OFDM System Using an Efficient Adaptive Predistorter (효과적인 적응 전처리왜곡기를 이용한 OFDM 시스템에서의 비선형 왜곡 보상)

  • 강현우;조용수;윤대희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.696-705
    • /
    • 1997
  • This paper presents an efficient adaptive predistortion technique compensating linear and nonlinear distortions caused by high-power amplifier (HPA) with memory in OFDM systems. The efficient adaptive data predistortion techniques proposed for compensation of HPA with memory in single carrier systems cannot be applied to OFDM systems since the possible input levels for HPA is infinite in OFDM systems. Also, previous adaptive predistortion techniques, based on Volterra series modeling, are not suitable for real-time implementation due to high computational burden and slow convergence rate. In the proposed approach, the memoryless HPA preceded by a linear filter in OFDM systems is modeled by the Wiener system which is then precompensated by the proposed adaptive predistorter with a minimum number of filter taps. An adaptive algorithm for adjusting the proposed adaptive predistorter is derived using the stochastic gradient method. It is demonstrated by computer simulation that the performance of OFDM system suffering from nonlinear distortion can be greatly improved by the proposed efficient adaptive predistorter using a small number of filter taps.

  • PDF

A High-Speed Data Processing Algorithm for RFID Input Data Stream Using Multi-Buffer (RFID 입력 테이터 스트림에 대한 다중 버퍼 기반의 고속 데이터 처리 알고리즘)

  • Han, Soo;Shin, Seung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.302-307
    • /
    • 2007
  • RFID를 기반으로 유비쿼터스 환경의 응용 서비스를 지원하는 미들웨어는 지속적으로 끊임없이 입력되는 데이터를 정확하게 실시간으로 처리하고 응용 서비스에서 질의하는 결과를 획득해서 전달하여야 한다. 이와 같은 지속적으로 입력되는 대량의 데이터 스트림을 처리하기 위해서 데이터 스트림 관리 시스템(Data Stream Management System: DSMS)을 개발하기 위한 연구가 진행되고 있다. 기존에 연구되는 데이터 스트림에 대한 알고리즘은 대부분 연속 질의 결과들 사이의 평균 오차를 줄이고, 부하 발생 시 데이터의 우선순위에 따라 버리는 것에 초점이 맞추어져 있다. 본 논문에서는 RFID EPC 라는 데이터 특성에 맞추어 다중버퍼를 이용함으로써 고속의 데이터 처리 능력을 얻고, 각 버퍼마다 일정한 규칙을 통해 질의에 있어서도 빠른 대응을 할 수 있는 알고리즘을 제안한다. 본 논문은 현재 DSMS의 관련 연구와 고속 데이터 처리의 필요성을 말하고, 제안하는 알고리즘 설명과 시뮬레이션을 통해 단일버퍼와 다중버퍼일 경우 데이터 처리 속도 성능 평가와 제안한 알고리즘에 맞도록 버퍼가 생성 되는지 테스트하는 것으로 구성된다.

  • PDF

The Study on Load Forecasting Using Artificial Intelligent Algorithm (지능형 알고리즘을 이용한 전력 소비량 예측에 관한 연구)

  • Lee, Jae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.720-722
    • /
    • 2009
  • Optimal operation of electric power generating plants is very essential for any power utility organization to reduce input costs and possibly the prices of electricity in general. This paper developed models for load forecasting using neural networks approach. This model is tested using actual load data of the Busan and weather data to predict the load of the Busan for one month in advance. The test results showed that the neural network forecasting approach is more suitable and efficient for a forecasting application.

  • PDF

Research and development of haptic simulator for Dental education using Virtual reality and User motion

  • Lee, Sang-Hyun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.114-120
    • /
    • 2018
  • The purpose of this paper is to develop simulations that can be used for virtual education in dentistry. This development goal is to allow dental students to learn the necessary surgical techniques at the point of their choice, not going into the operating room, away from time, space, and physical limits. In this paper configuration, the optimization method is applied convergent, and when the operation of the VR contents is performed, the content data is extracted from the interaction analysis formed in the VR engine, and the data is processed by the content algorithm. It also computes events and dental operations generated within the 3D engine programming and generates corresponding events through data processing according to the input signal. The visualization information is output to the HMD using the rendering information. In addition, the operating room environment was constructed by studying lighting and material for actual operating room environment. We applied the ratio of actual space to virtual space and the ratio between character and actual person to create a spatial composition at a similar rate to actual space.

Region Segmentation using Discrete Morse Theory - Application to the Mammography (이산 모스 이론을 이용한 영역 분할 - 맘모그래피에의 응용)

  • Hahn, Hee Il
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.1
    • /
    • pp.18-26
    • /
    • 2019
  • In this paper we propose how to detect circular objects in the gray scale image and segment them using the discrete Morse theory, which makes it possible to analyze the topology of a digital image, when it is transformed into the data structure of some combinatorial complex. It is possible to get meaningful information about how many connected components and topologically circular shapes are in the image by computing the persistent homology of the filtration using the Morse complex. We obtain a Morse complex by modeling an image as a cubical cellular complex. Each cell in the Morse complex is the critical point at which the topological structure changes in the filtration consisting of the level sets of the image. In this paper, we implement the proposed algorithm of segmenting the circularly shaped objects with a long persistence of homology as well as computing persistent homology along the filtration of the input image and displaying in the form of a persistence diagram.

A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels

  • Huang, Boyang;Kong, Zhengmin;Fang, Yanjun;Jin, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1904-1921
    • /
    • 2019
  • In this paper, we investigate the problem of secure communications in multiple-input-multiple-output interference networks from the perspective of physical layer security. Specifically, the legitimate transmitter-receiver pairs are divided into different categories of active and inactive. To enhance the security performances of active pairs, inactive pairs serve as cooperative jammers and broadcast artificial noises to interfere with the eavesdropper. Besides, active pairs improve their own security by using joint transceivers. The encoding of active pairs and inactive pairs are designed by maximizing the difference of mean-squared errors between active pairs and the eavesdropper. In detail, the transmit precoder matrices of active pairs and inactive pairs are solved according to game theory and linear programming respectively. Experimental results show that the proposed algorithm has fast convergence speed, and the security performances in different scenarios are effectively improved.

Performance Evaluation of Pipelined Dynamic Bandwidth Algorithm for XG-PON (XG-PON의 Pipeline 방식의 동적대역할당 성능평가)

  • Gong, Byung Gu;Han, Man Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.148-149
    • /
    • 2014
  • This paper evaluates performance of a pipelined dynamic bandwidth allocation scheme for XG-PON (10-Gbps-capable passive optical network) system for power saving. Under self-similar traffic and balanced input loads, we evaluate performance of XG-PON systems using computer simulations.

  • PDF

A LT Codec Architecture with an Efficient Degree Generator and New Permutation Technique (효율적인 정도 생성기 및 새로운 순열 기법을 가진 LT 코덱 구조)

  • Hasan, Md. Tariq;Choi, Goang Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.117-125
    • /
    • 2014
  • In this paper, a novel hardware architecture of the LT codec is presented where non-BP based decoding algorithm is applied. Novel LT codec architecture is designed with an efficient degree distribution unit using Verilog HDL. To perform permutation operation, different initial valued or time shifted counters have been used to get pretty well permutations and an effect of randomness. The codec will take 128 bits as input and produce 256 encoded output bits. The simulation results show expected performances as the implemented distribution and the original distribution are pretty same. The proposed LT codec takes 257.5 cycle counts and $2.575{\mu}s$ for encoding and decoding instead of 5,204,861 minimum cycle counts and 4.43s of the design mentioned in the previous works where iterative soft BP decoding was used in ASIC and ASIP implementation of the LT codec.

A Blinding-Based Scalar Multiplication Algorithm Secure against Power Analysis Attacks (전력분석공격에 대한 블라인딩 기반의 상수배 알고리즘)

  • Kim, Chang-Kyun;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.117-121
    • /
    • 2007
  • Most existing countermeasures against classical DPA are vulnerable to new DPA, e.g., refined power analysis attack (RPA), zero-value point attack (ZPA), and doubling attack. More recently, Mamiya et al proposed a new countermeasure (so-called BRIP) against RPA, ZPA, classical DPA and SPA. This countermeasure, however, also has a vulnerability of scalar multiplication computations by exploiting specially chosen input message. Therefore, to prevent various power analysis attacks like DPA and new SPA, we propose an enhanced countermeasure by developing a new random blinding technique.