• Title/Summary/Keyword: Slicing

Search Result 310, Processing Time 0.029 seconds

Performance Analysis of the Optimal Turbo Coded V-BLAST technique in Adaptive Modulation System (적응 변조 시스템에서 최적의 터보 부호화된 V-BLAST 기법의 성능 분석)

  • Lee, Kyung-Hwan;Choi, Kwang-Wook;Ryoo, Sang-Jin;Kang, Min-Goo;Hong, Dae-Ki;You, Cheol-Woo;Hwang, In-Tae;Kim, Cheol-Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.385-391
    • /
    • 2007
  • In this paper, we propose and observe the Adaptive Modulation system with optimal Turbo Coded V-BLAST (Vertical-Bell-lab Layered Space-Time) technique that is applied the extrinsic information from MAP (Maximum A Posteriori) Decoder with Iterative Decoding to use as a priori probability in two decoding procedures of V-BLAST: ordering and slicing. Also, comparing with the Adaptive Modulation system using conventional Turbo Coded V-BLAST technique that is simply combined V-BLAST with Turbo Coding scheme, we observe how much throughput performance has been improved. As a result of simulation, in the Adaptive Modulation systems with several Turbo Coded V-BLAST techniques, the optimal Turbo Coded V-BLAST technique has higher throughput gain than the conventional Turbo Coded V-BLAST technique. Especially, the results show that the proposed scheme achieves the gain of 1.5 dB SNR compared to the conventional system at 2.5 Mbps throughput.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

Resource Allocation Method using Credit Value in 5G Core Networks (5G 코어 네트워크에서 Credit Value를 이용한 자원 할당 방안)

  • Park, Sang-Myeon;Mun, Young-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.515-521
    • /
    • 2020
  • Recently, data traffic has exploded due to development of various industries, which causes problems about losing of efficiency and overloaded existing networks. To solve these problems, network slicing, which uses a virtualization technology and provides a network optimized for various services, has received a lot of attention. In this paper, we propose a resource allocation method using credit value. In the method using the clustering technology, an operation for selecting a cluster is performed whenever an allocation request for various services occurs. On the other hand, in the proposed method, the credit value is set by using the residual capacity and balancing so that the slice request can be processed without performing the operation required for cluster selection. To prove proposed method, we perform processing time and balancing simulation. As a result, the processing time and the error factor of the proposed method are reduced by about 13.72% and about 7.96% compared with the clustering method.

An Efficient Network Slice Configuration Method in 5G Mobile Networks

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.101-112
    • /
    • 2022
  • In this paper, we analyze 5G network slicing and propose an efficient network slice configuration method in 5G mobile networks. Network slicing can be identified and performed based on the network slice instance information in 5G mobile networks. In case of discordance between the UE's network slice instance information and the network's one, the unnecessary signalling overhead occurs, when the UE's PDU Session Establishment request to the network fails. To solve this problem, this paper proposes two efficient network slice configuration methods, the UE-based ENSC(Efficient Network Slice Configuration) method and the Network-based ENSC method. The proposed schemes perform the prompt the configuration and provision of the updated network slice instance information between the UE and network and improve battery and resource efficiency and minimize unnecessary signalling overhead compared to existing methods in 5G mobile networks.

Assessment of Microbial Quality on the Preparation of Stir-Fried Dried-Shrimp with Garlic stems in the Meal Service Operation for the Elderly (노인급식에서 제공되는 마늘쫑 새우 볶음의 미생물학적 품질평가)

  • Kim, Hae-Young
    • Journal of the Korean Society of Food Culture
    • /
    • v.22 no.4
    • /
    • pp.441-448
    • /
    • 2007
  • The purpose of this study was to identify HACCP-based CCP and CP from the microbial quality assessment on the process of side dish (stir-fried dried-shrimp with garlic stems) production in the meal service operation for the elderly. Total plate counts (TPC) of fresh garlic stalks were $7.80{\times}10^{3}$ CFU/g and they were above the standard value of microbial growth potential. The TPC, Coliform and E.coli were not detected in the dried shrimps. The TPCs after rinsing and slicing the garlic stems were $2.5{\times}10^{2}$ CFU/g and $5.5{\times}10^{2}$ CFU/g, respectively. The TPC number of cook’s hand and cutting board were also exceeded the standard limit with values of $2.2{\times}10^{2}$ CFU/g and $10.0{\times}10$ CFU/g, respectively. However, the TPC, Coliform and E.coli were not detected in the other cooking instruments. The identified CCP in inspection step was fresh garlic stems and that of prepreparation step was slicing the stems after blanching. Cook’s hand and cutting board were also verified as CCP and the other steps in cooking process and utensils tested were identified as CP’s. These result’s suggest that it is important to control the microbial contamination of raw materials at purchasing step and the sanitary education program should be developed for the employees for continuous supplement of safe and sound meal service for the elderly.

Automatic Placement and Routing System for Gate Array (게이트 어레이의 자동 배치, 배선 시스템)

  • 이건배;정정화
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.5
    • /
    • pp.572-579
    • /
    • 1988
  • In this paper, a system of automatic placement and routing for gate array layout design is proposed. In the placement stage, the circuit is partitioned and using the concept of min-cut slicing, and each partitioned module is placed, so that the routing density over the entire chip be uniformized and the total wiring length be minimized. In the global routing stage, the concept of the probabilistic routing density is introduced to unify the wiring congestions in each channel. In the detailed routing stage, the multi-terminal nets are partitioned into the two-terminal nets. The ordered channel graph is proposed which implies the vertical and the horizontal constranint graphs simultaneously. And using the ordered channel graph, the proposed routing algorithm assigns the signal nets to the tracks. Also the proposed placement and routing algorithms are implimented on IBM/PC-AT to construct PC-level gate array layout system.

  • PDF

Throughput Improvement of Adaptive Modulation System with an Efficient Turbo-Coded V-BLAST Technique in each MIMO Channel

  • Ryoo, Sang-Jin;Kim, Seo-Gyun;Na, Cheol-Hun;Hong, Jin-Woo;Hwang, In-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.905-908
    • /
    • 2008
  • In this paper, an Adaptive Modulation (AM) system with an efficient turbo-coded Vertical-Bell-lab Layered Space-Time (V-BLAST) technique is proposed. The proposed decoding algorithm adopts iteratively the extrinsic information from a Maximum a Posteriori (MAP) decoder as a priori probability in the two decoding procedures of the V-BLAST scheme of ordering and slicing. In this analysis, each MIMO channel is assumed to be a part of the system of performance improvement.

  • PDF

Implementation of a Web-Based Intelligent Decision Support System for Apartment Auction (아파트 경매를 위한 웹 기반의 지능형 의사결정지원 시스템 구현)

  • Na, Min-Yeong;Lee, Hyeon-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2863-2874
    • /
    • 1999
  • Apartment auction is a system that is used for the citizens to get a house. This paper deals with the implementation of a web-based intelligent decision support system using OLAP technique and data mining technique for auction decision support. The implemented decision support system is working on a real auction database and is mainly composed of OLAP Knowledge Extractor based on data warehouse and Auction Data Miner based on data mining methodology. OLAP Knowledge Extractor extracts required knowledge and visualizes it from auction database. The OLAP technique uses fact, dimension, and hierarchies to provide the result of data analysis by menas of roll-up, drill-down, slicing, dicing, and pivoting. Auction Data Miner predicts a successful bid price by means of applying classification to auction database. The Miner is based on the lazy model-based classification algorithm and applies the concepts such as decision fields, dynamic domain information, and field weighted function to this algorithm and applies the concepts such as decision fields, dynamic domain information, and field weighted function to this algorithm to reflect the characteristics of auction database.

  • PDF

Noise Suppression of Spectrum-Sliced WDM-PON Light Sources Using FP-LD

  • Lee, Woo-Ram;Cho, Seung-Hyun;Park, Jae-Dong;Kim, Bong-Kyu;Kim, Byoung-Whi
    • ETRI Journal
    • /
    • v.27 no.3
    • /
    • pp.334-336
    • /
    • 2005
  • We improved the performance of the spectrum-sliced light source for wavelength-division-multiplexed passive optical networks by employing a Fabry-Perot laser diode(FP-LD). We found that the FP-LDs can suppress the intensity noise as significantly as using a gain-saturated semiconductor optical amplifier. The transmission characteristics were measured and analyzed in both conditions with and without employing an FP-LD.

  • PDF

Class Slicing Method using Program Dependency Graph in C++ (C++에서 프로그램 의존도 그래프를 이용한 클래스 분해 방법)

  • 김영선;김홍진;손용식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.63-80
    • /
    • 1998
  • In object-oriented software development, reuse has been studied for the enhancement of software quality and software developer's productivity. But improper modeling in design phase and uncontrolled change during maintenance activities have a problem to reuse a class. In this paper we analyze a semantic cohesion of classes using C++ Program dependency graph, and slice a class with cohesion, so that this method supports the re-estimate of class quality and the extensibility of class. Therefore this proposed method in this paper increases the easibility of the restructuring in the reusable systems, when the developer selects a requested component for a object-oriented program development.

  • PDF