• Title/Summary/Keyword: Real MAC

Search Result 226, Processing Time 0.026 seconds

MIMO Techniques for Green Radio Guaranteeing QoS

  • Nicolaou, Marios;Han, Congzheng;Beh, Kian Chung;Armour, Simon;Doufexi, Angela
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.130-139
    • /
    • 2010
  • Environmental issues and the need to reduce energy consumption for lowering operating costs have pushed power efficiency to become one of the major issues of current research in the field of wireless networks. This paper addresses a number of multiple input multiple output (MIMO) precoding and scheduling techniques across the PHY and MAC layers that can operate under a reduced link budget and collectively improve the transmit power efficiency of a base station, while maintaining the same levels of service. Different MIMO transmission and precoding schemes proposed for LTE, achieving varying degrees of multiuser diversity in both the time, frequency as well as the space domain, are examined. Several fairness-aware resource allocation algorithms are applied to the considered MIMO schemes and a detailed analysis of the tradeoffs between power efficiency and quality of service is presented. This paper explicitly examines the performance of a system serving real-time, VoIP traffic under different traffic loading conditions and transmit power levels. It is demonstrated that by use of efficient scheduling and resource allocation techniques significant savings in terms of consumed energy can be achieved, without compromising QoS.

Structural damage identification based on modified Cuckoo Search algorithm

  • Xu, H.J.;Liu, J.K.;Lv, Z.R.
    • Structural Engineering and Mechanics
    • /
    • v.58 no.1
    • /
    • pp.163-179
    • /
    • 2016
  • The Cuckoo search (CS) algorithm is a simple and efficient global optimization algorithm and it has been applied to figure out large range of real-world optimization problem. In this paper, a new formula is introduced to the discovering probability process to improve the convergence rate and the Tournament Selection Strategy is adopted to enhance global search ability of the certain algorithm. Then an approach for structural damage identification based on modified Cuckoo search (MCS) is presented. Meanwhile, we take frequency residual error and the modal assurance criterion (MAC) as indexes of damage detection in view of the crack damage, and the MCS algorithm is utilized to identifying the structural damage. A simply supported beam and a 31-bar truss are studied as numerical example to illustrate the correctness and efficiency of the propose method. Besides, a laboratory work is also conducted to further verification. Studies show that, the proposed method can judge the damage location and degree of structures more accurately than its counterpart even under measurement noise, which demonstrates the MCS algorithm has a higher damage diagnosis precision.

A Dynamic Queue Management for Network Coding in Mobile Ad-hoc Network

  • Kim, Byun-Gon;Kim, Kwan-Woong;Huang, Wei;Yu, C.;Kim, Yong K.
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.6-11
    • /
    • 2013
  • Network Coding (NC) is a new paradigm for network communication. In network coding, intermediate nodes create new packets by algebraically combining ingress packets and send it to its neighbor node by broadcast manner. NC has rapidly emerged as a major research area in information theory due to its wide applicability to communication through real networks. Network coding is expected to improve throughput and channel efficiency in the wireless multi-hop network. Many researches have been carried out to employ network coding to wireless ad-hoc network. In this paper, we proposed a dynamic queue management to improve coding opportunistic to enhance efficiency of NC. In our design, intermediate nodes are buffering incoming packets to encode queue. We expect that the proposed algorithm shall improve encoding rate of network coded packet and also reduce end to end latency. From the simulation, the proposed algorithm achieved better performance in terms of coding gain and packet delivery rate than static queue management scheme.

A Performance Analysis of CSMA in Wireless Networks Based on MIL-STD-188-220 (MIL-STD-188-220기반 무선네트워크의 CSMA 성능분석)

  • Seo, NanSol;Joo, JaeWoo;Jang, DohngWoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1129-1137
    • /
    • 2012
  • The wireless link of tactical datalink system provides a communication network to share digitalized tactical data in real-time. Also MAC(Multiple Access Control) of this system is subject to TDMA or CSMA according to a operated circumstance of target nodes to exchange the data reliably. In this paper, we verify the operability when we use CSMA scheme based on MIL-STD-188-220 in tactical datalink system which is basically designed with TDMA, and provide a mathematical analysis scheme to verify the operability and performance. Finally, by implementing CSMA scheme to a tactical datalink equipment we obtain practical results which can be compared with theoretical results.

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF

A Study on the Recognition of Human Pulse Using Wavelet Transform (웨이브렛 변환을 이용한 맥파의 인식에 관한 연구)

  • 길세기;김낙환;박승환;민홍기;흥승홍
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.269-272
    • /
    • 2000
  • It is need to develop and apply a human pulse diagnosis system providing a quantitative and automatic analysis in the the oriental medicine. In order to analyze quantitatively the characteristic of pulsation, each of points had to be recognized accurately notifying the existence and the position of feature point in the wave form. And getting the period of human pulse. Thus, in this paper, it is proposed the preprocessing method of human pulse and the detection method of period by Wavelet Transformation. The human pulse is seprated from each band through Wavelet Transformation and feature points can be recognized through over the fact, and then the parameter of proposed Mac-Jin parameter is measured. Commonly, Human pulse signal has often various noises which are baseline drift, high frequency noise and so on. So it is significant to remove that noises. Thus, in this paper, the one period of human pulse is deciede and the feature points are detected after doing the preprocessing by wavelet transformation. As a result, it could be confirmed that this method is effective as a real program for the auto-diagnosis of human pulse.

  • PDF

The differences in the potential energy anomaly for analyzing mixing and stratification between 2D and 3D model

  • Minh, Nguyen Ngoc;Hwang, Jin Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.240-240
    • /
    • 2015
  • As Simpson et al. (1990) emphasized the importance of the straining process in the stratification and mixing in the estuarine circulation process, various researches have investigated on the relative contribution of each process to the overall potential energy anomaly dynamics. However, many numerical works have done only for two dimensional modeling along channel or the short distance cross sectional three dimensional simulations as Burchard et al. (2008) and the estuarine channel was not simulated so far. But, in the study on the physics of shallow coastal seas, spatial dimension in the three dimensional way affects significantly on results of a particular numerical model. Therefore, the comparison of two and three dimensional models is important to understand the real physics of mixing and stratification in an estuary. Also, as Geyer and MacCready (2013) pointed out that the lateral process seems to be important in determining the periodic stratifications, to study such process the three dimensional modeling must be required. The present study uses a numerical model to show the signification roles of each term of the time-dependent dynamic equation for the potential energy anomaly (PEA) in controlling along and lateral channel flows and different stratification structures. Moreover, we present the relationships between the ${\Phi}$-advection, the depth mean straining, vertical mixing and vertical advection can explain well how water level, salinity distribution and across velocity 2D model are slightly different from 3D.

  • PDF

Considering the accuracy and efficiency of the wireless sensor network Support Plan (무선 센서 네트워크에서의 정확도와 효율성을 고려한 기술 지원 방안)

  • You, Sanghyun;Choi, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.96-98
    • /
    • 2014
  • Wireless Sensor Network(WSN) is a wireless real-time information(Acquired from the sensor nodes that have the computing power and wireless communication capabilities.) collected, and to take advantage of processing techniques. Currently it is very diverse, such as environmental monitoring, health care, security, smart home, smart grid applications is that. Thus it is required in the wireless sensor network, the algorithm for the efficient use of the limited energy capacity. Suggested by the algorithm for selecting a cluster head node for a hybrid type and clustered, by comparing the amount of energy remaining and a connection between the nodes In this paper, we aim to increase efficiency and accuracy of the wireless sensor network.

  • PDF

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

Design and Implementation of 3D Geospatial Open Platform Based on HTML5/WebGL Technology (HTML5/WebGL 기반 3D 공간정보 오픈플랫폼 소프트웨어 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.57-66
    • /
    • 2015
  • Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.