• Title/Summary/Keyword: Limited Memory

Search Result 549, Processing Time 0.026 seconds

A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios

  • Wang, Lusheng;Chang, Kun;Wang, Xiumin;Wei, Zhen;Hu, Qingxin;Kai, Caihong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4122-4143
    • /
    • 2018
  • Because of the increment in network scale and test expenditure, simulators gradually become main tools for research on key problems of wireless networking, such as radio resource management (RRM) techniques. However, existing simulators are generally event-driven, causing unacceptably large simulation time owing to the tremendous number of events handled during a simulation. In this article, a mass-processing framework for RRM simulations is proposed for the scenarios with a massive amount of terminals of Internet of Things accessing 5G communication systems, which divides the time axis into RRM periods and each period into a number of mini-slots. Transmissions within the coverage of each access point are arranged into mini-slots based on the simulated RRM schemes, and mini-slots are almost fully occupied in dense scenarios. Because the sizes of matrices during this process are only decided by the fixed number of mini-slots in a period, the time expended for performance calculation is not affected by the number of terminals or packets. Therefore, by avoiding the event-driven process, the proposal can simulate dense scenarios in a quite limited time. By comparing with a classical event-driven simulator, NS2, we show the significant merits of our proposal on low time and memory costs.

Implementation of an USB Camera Interface Based on Embedded Linux System (임베디드 LINUX 시스템 기반 USB 카메라 인터페이스 구현)

  • Song Sung-Hee;Kim Jeong-Hyeon;Kim Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.4
    • /
    • pp.169-175
    • /
    • 2005
  • In recent, implementation of the embedded system is gradually in the spotlight of world-wide by information technology(IT) engineers. By this time, an implementation of real time system is limited on image acquisition and processing system in practical. In this paper, the USB camera interface system based on the embedded linux OS is implemented using USB 2.0 camera with low cost. This system can obtain image signals into the memory via X-hyper255B processor from USB camera. It is need to initialize USB camera by the Video4Linux for the kernel device driver. From the system image capturing and image processing can be performed. It is confirmed that the image data can be transformed to packet of Network File System(NFS) and connected to the internetwork, then the data can be monitored from the client computer connected to the internetwork.

  • PDF

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF

The Study of the Object Replication Management using Adaptive Duplication Object Algorithm (적응적 중복 객체 알고리즘을 이용한 객체 복제본 관리 연구)

  • 박종선;장용철;오수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.51-59
    • /
    • 2003
  • It is effective to be located in the double nodes in the distributed object replication systems, then object which nodes share is the same contents. The nodes store an access information on their local cache as it access to the system. and then the nodes fetch and use it, when it needed. But with time the coherence Problems will happen because a data carl be updated by other nodes. So keeping the coherence of the system we need a mechanism that we managed the to improve to improve the performance and availability of the system effectively. In this paper to keep coherence in the shared memory condition, we can set the limited parallel performance without the additional cost except the coherence cost using it to keep the object at the proposed adaptive duplication object(ADO) algorithms. Also to minimize the coherence maintenance cost which is the bi99est overhead in the duplication method, we must manage the object effectively for the number of replication and location of the object replica which is the most important points, and then it determines the cos. And that we must study the adaptive duplication object management mechanism which will improve the entire run time.

  • PDF

Electrical Conduction Mechanism in the Insulating TaNx Film (절연성 TaNx 박막의 전기전도 기구)

  • Ryu, Sungyeon;Choi, Byung Joon
    • Korean Journal of Materials Research
    • /
    • v.27 no.1
    • /
    • pp.32-38
    • /
    • 2017
  • Insulating $TaN_x$ films were grown by plasma enhanced atomic layer deposition using butylimido tris dimethylamido tantalum and $N_2+H_2$ mixed gas as metalorganic source and reactance gas, respectively. Crossbar devices having a $Pt/TaN_x/Pt$ stack were fabricated and their electrical properties were examined. The crossbar devices exhibited temperature-dependent nonlinear I (current) - V (voltage) characteristics in the temperature range of 90-300 K. Various electrical conduction mechanisms were adopted to understand the governing electrical conduction mechanism in the device. Among them, the PooleFrenkel emission model, which uses a bulk-limited conduction mechanism, may successfully fit with the I - V characteristics of the devices with 5- and 18-nm-thick $TaN_x$ films. Values of ~0.4 eV of trap energy and ~20 of dielectric constant were extracted from the fitting. These results can be well explained by the amorphous micro-structure and point defects, such as oxygen substitution ($O_N$) and interstitial nitrogen ($N_i$) in the $TaN_x$ films, which were revealed by transmission electron microscopy and UV-Visible spectroscopy. The nonlinear conduction characteristics of $TaN_x$ film can make this film useful as a selector device for a crossbar array of a resistive switching random access memory or a synaptic device.

Cognitive and other neuropsychological profiles in children with newly diagnosed benign rolandic epilepsy

  • Kwon, Soonhak;Seo, Hye-Eun;Hwang, Su Kyeong
    • Clinical and Experimental Pediatrics
    • /
    • v.55 no.10
    • /
    • pp.383-387
    • /
    • 2012
  • Purpose: Although benign rolandic epilepsy (BRE) is a benign condition, it may be associated with a spectrum of behavioral, psychiatric, and cognitive disorders. This study aimed to assess the cognitive and other neuropsychological profiles of children with BRE. Methods: In total, 23 children with BRE were consecutively recruited. All children underwent sleep electroencephalography (EEG) and were assessed on a battery of comprehensive neuropsychological tests including the Korean versions of the Wechsler intelligence scale for children III, frontal executive neuropsychological test, rey complex figure test, Wisconsin card sorting test, attention deficit diagnostic scale, and child behavior checklist scale. Results: The study subjects included 13 boys and 10 girls aged $9.0{\pm}1.6$ years. Our subjects showed an average monthly seizure frequency of $0.9{\pm}0.7$, and a majority of them had focal seizures (70%). The spike index (frequency/min) was $4.1{\pm}5.3$ (right) and $13.1{\pm}15.9$ (left). Of the 23 subjects, 9 showed frequent spikes (>10/min) on the EEG. The subjects had normal cognitive and frontal executive functions, memory, and other neuropsychological sub-domain scores, even though 8 children (35%) showed some evidence of learning difficulties, attention deficits, and aggressive behavior. Conclusion: Our data have limited predictive value; however, these data demonstrate that although BRE appears to be benign at the onset, children with BRE might develop cognitive, behavioral, and other psychiatric disorders during the active phase of epilepsy, and these problems may even outlast the BRE. Therefore, we recommend scrupulous follow-up for children with BRE.

A Study for Complexity Improvement of Automatic Speaker Verification in PDA Environment (PDA 환경에서 자동화자 확인의 계산량 개선을 위한 연구)

  • Seo, Chang-Woo;Lim, Young-Hwan;Jeon, Sung-Chae;Jang, Nam-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.170-175
    • /
    • 2009
  • In this paper, we propose real time automatic speaker verification (ASV) system to protect personal information on personal digital assistant (PDA) device. Recently, the capacity of PDA has extended and been popular, especially for mobile environment such as mobile commerce (M-commerce). However, there still exist lots of difficulties for practical application of ASV utility to PDA device because it requires too much computational complexity. To solve this problem, we apply the method to relieve the computational burden by performing the preprocessing such as spectral subtraction and speech detection during the speech utterance. Also by applying the hidden Markov model (HMM) optimal state alignment and the sequential probability ratio test (SPRT), we can get much faster processing results. The whole system implementation is simple and compact enough to fit well with PDA device's limited memory and low CPU speed.

  • PDF

Reporting Tool using Fat Client for Web-based Ad Hoc Reporting (웹 기반의 Ad Hoc 리포팅을 위한 Fat Client를 갖는 리포팅 툴)

  • Choe Jee-Woong;Kim Myung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.4
    • /
    • pp.264-274
    • /
    • 2006
  • Recently, a variety of organizations including enterprises tend to try to use reporting tools as a data analysis tool for decision making support because reporting tools are capable of formatting data flexibly. Traditional reporting tools have thin-client structure in which all of dynamic documents are generated in the server side. This structure enables reporting tools to avoid repetitive process to generate dynamic documents, when many clients intend to access the same dynamic document. However, generating dynamic documents for data analysis doesn't consider a number of potential readers and increases requests to the server by making clients input various parameters at short intervals. In the structure of the traditional reporting tools, the increase of these requests leads to the increase of processing load in the server side. Thus, we present the reporting tool that can generate dynamic documents at the client side. This reporting tool has a processing mechanism to deal with a number of data despite the limited memory capacity of the client side.

Application of a Hydroinformatic System for Calibration of a Catchment Modelling System (강우-유출모형의 검정을 위한 수문정보시스템의 적용)

  • Choi, Kyung-Sook
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.3
    • /
    • pp.129-138
    • /
    • 2003
  • A new methodology for selecting spatially variable model control parameter values through consideration of inference models within a Hydroinformatic system has been developed to overcome problems associated with determination of spatially variable control parameter values for both ungauged and gauged catchment. The adopted Hydroinformatic tools for determination of control parameter values were a GIS(Arc/Info) to handle spatial and non-spatial attribute information, the SWMM(stormwater management model) to simulate catchment response to hydrologic events, and lastly, L_BFGS_B(a limited memory quasi-Newton algorithm) to assist in the calibration process. As a result, high accuracy of control parameter estimation was obtained by considering the spatial variations of the control parameters based on landuse characteristics. Also, considerable time and effort necessary for estimating a large number of control parameters were reduced from the new calibration approach.

  • PDF

SLC Buffer Performance Improvement using Page Overwriting Method in TLC NAND Flash-based Storage Devices (TLC 낸드 플래시기반 저장 장치에서 페이지 중복쓰기 기법을 이용한 SLC 버퍼 성능향상 연구)

  • Won, Samkyu;Chung, Eui-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.36-42
    • /
    • 2016
  • In multi-level-cell based storage devices, TLC NAND has been employed solid state drive due to cost effectiveness. Since TLC has slow performance and low endurance compared with MLC, TLC based storage has adopted SLC buffer scheme to improve performance. To improve SLC buffer scheme, this paper proposes page overwriting method in SLC block. This method provides data updates without erase operation within a limited number. When SLC buffer area is filled up, FTL should execute copying valid pages and erasing it. The proposed method reduces erase counts by 50% or more compared with previous SLC buffer scheme. Simulation results show that the proposed SLC buffer overwrite method achieves 2 times write performance improvement.