• Title/Summary/Keyword: Small-size window

Search Result 104, Processing Time 0.03 seconds

TCP-GT: A New Approach to Congestion Control Based on Goodput and Throughput

  • Jung, Hyung-Soo;Kim, Shin-Gyu;Yeom, Heon-Young;Kang, Soo-Yong
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.499-509
    • /
    • 2010
  • A plethora of transmission control protocol (TCP) congestion control algorithms have been devoted to achieving the ultimate goal of high link utilization and fair bandwidth sharing in high bandwidth-delay product (HBDP) networks. We present a new insight into the TCP congestion control problem; in particular an end-to-end delay-based approach for an HBDP network. Our main focus is to design an end-to-end mechanism that can achieve the goal without the assistance of any network feedback. Without a router's aid in notifying the network load factor of a bottleneck link, we utilize goodput and throughput values in order to estimate the load factor. The obtained load factor affects the congestion window adjustment. The new protocol, which is called TCP-goodput and throughput (GT), adopts the carefully designed inversely-proportional increase multiplicative decrease window control policy. Our protocol is stable and efficient regardless of the link capacity, the number of flows, and the round-trip delay. Simulation results show that TCP-GT achieves high utilization, good fairness, small standing queue size, and no packet loss in an HBDP environment.

Experimental discussion on the installation of filler wall for sound insulation measurements of shipboard windows (선박용 창의 차음성능 측정용 충진벽체 설치에 관한 실험적 고찰)

  • Kim, Sang-Ryul;Kang, Hyun-Ju;Kim, Hyun-Sil
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2008.04a
    • /
    • pp.276-279
    • /
    • 2008
  • In order to measure sound transmission loss (STL) of a shipboard window of small size, a special partition is built into the test opening between two reverberation rooms and the specimen is placed in that partition. For high sound insulation, the filler wall often has multi-layered structure such as double-brick wall or buckhead structure with thick steel plate, absorptive material, and sandwich panels. This paper discusses the installation method of a multi-layered filler wall that consist of gypsum boards, lead plates, and glass wool. The experimental results of various wall structures are introduced. The comparison between the results show that the sound bridge effect plays a significant role in lowering the maximum STL of the filler wall. It is also found that the higher the sound insulation performance of the filler wall is, the more important the franking transmission through other side wall of the test facility is.

  • PDF

A Study on the 3-Dimensional Implementation of Computer-Aid Management of Stereo Images (입체 화상의 3차원 전산모사기 구현에 관한 연구)

  • Lee, Joong;Yoon, Do-Young
    • Korean Chemical Engineering Research
    • /
    • v.47 no.2
    • /
    • pp.179-184
    • /
    • 2009
  • Recent evolution of computer technology enhances the effectiveness of CFD(Computational Fluid Dynamics) analysis for the 3-dimensional complex transport phenomena including turbulent flows. Cheaper and easier than laser and ultra-sonic methods, the windows simulator name by CAMSI(Computer-Aided Management of Stereo Images) has been developed in order to implement the 3-dimensional image using a disparity histogram extracted from left and right stereo images. In our program using the area-based method, the matching pixel finding methods consist of SSD(Sum of Squared Distance), SAD(Sum of Absolute Distance), NCC(Normalized Correlation Coefficient) and MPC(Matching Pixel Count). On performing the program, stereo images on different window sizes for various matching pixel finding methods are compared reasonably. When the image has a small noise, SSD on small window size is more effective. Whereas there is much noise, NCC or MPC is more effective than SSD. CAMSI from the present study will be much helpful to implement the complex objects and to analyze 3-dimensional CFD around them.

Analytical Modeling of TCP Dynamics in Infrastructure-Based IEEE 802.11 WLANs

  • Yu, Jeong-Gyun;Choi, Sung-Hyun;Qiao, Daji
    • Journal of Communications and Networks
    • /
    • v.11 no.5
    • /
    • pp.518-528
    • /
    • 2009
  • IEEE 802.11 wireless local area network (WLAN) has become the prevailing solution for wireless Internet access while transport control protocol (TCP) is the dominant transport-layer protocol in the Internet. It is known that, in an infrastructure-based WLAN with multiple stations carrying long-lived TCP flows, the number of TCP stations that are actively contending to access the wireless channel remains very small. Hence, the aggregate TCP throughput is basically independent of the total number of TCP stations. This phenomenon is due to the closed-loop nature of TCP flow control and the bottleneck downlink (i.e., access point-to-station) transmissions in infrastructure-based WLANs. In this paper, we develop a comprehensive analytical model to study TCP dynamics in infrastructure-based 802.11 WLANs. We calculate the average number of active TCP stations and the aggregate TCP throughput using our model for given total number of TCP stations and the maximum TCP receive window size. We find out that the default minimum contention window sizes specified in the standards (i.e., 31 and 15 for 802.11b and 802.11a, respectively) are not optimal in terms of TCP throughput maximization. Via ns-2 simulation, we verify the correctness of our analytical model and study the effects of some of the simplifying assumptions employed in the model. Simulation results show that our model is reasonably accurate, particularly when the wireline delay is small and/or the packet loss rate is low.

The Influence of Unattended Distractors on the Identification of Targets (주의하지 않은 방해자극이 표적의 식별에 미치는 영향)

  • Park, ChangHo
    • Korean Journal of Cognitive Science
    • /
    • v.24 no.4
    • /
    • pp.365-391
    • /
    • 2013
  • Negative repetition effect (NRE) refers to the phenomenon that the accuracy of report is impaired when a target was flanked by the same distractor than when by alternative distractor. To probe the nature of NRE, this study introduced attention window(s) indicating the positions where a target might be presented, and non-attention window(s) where a target could not be presented. Attention windows are supposed to help participants detect targets readily. Two among three positions are indicated by attention windows in Exp. 1, and a single large attention window encompassing central two positions among four positions was used in Exp. 2, and either large or small attention window was used depending on the number of target candidates in Exp. 3. In the result of three experiments, NREs were consistently observed when both positions of a target and a distractor were indicated by previous attention windows. However, NREs (including its tendency) and its opposite, PREs were observed when a distractor was presented in the non-attention position, depending on its distance from the target and the size of attention window. It seems that this pattern of repetition effects is hard to be explained by repetition blindness hypothesis (Kanwisher, 1991), positional uncertainty hypothesis (Keren & Boer, 1985), and inhibitory attention capture hypothesis (Kwak et al., 1993). Instead it was proposed that shifting of spatial attention should be considered accordingly with the structure of stimulus display. The promising role of this task was discussed in studying the relation of attention and perception.

  • PDF

The Effects of Austempering Heat Treatment on the Processing Window and Mechanical Properties in Cast and Hot-rolled Fe-0.7wt%C-2.3wt%Si-0.3wt%Mn Steel (주조 및 열간 압연된 Fe-0.7wt%C-2.3wt%Si-0.3wt%Mn 강의 프로세싱 윈도우와 기계적 성질에 미치는 오스템퍼링 조건의 영향 비교)

  • Son, Je-Young;Hwang, Dong-Chan;Choi, Jae-Joo;Song, June-Hwan;Kim, Ji-Hun;Kim, Won-Bae;Ye, Byung-Joon
    • Journal of Korea Foundry Society
    • /
    • v.30 no.2
    • /
    • pp.60-65
    • /
    • 2010
  • In this study, we investigate the effects of austempering heat treatment on the processing window and mechanical properties in cast and hot-rolled Fe-0.7 C-2.3 Si-0.3 Mn steel. Each specimens were austenitised at $900^{\circ}C$ for 7 min, and austempered at $260^{\circ}C,\;320^{\circ}C$, and $380^{\circ}C$ for the various periods of time from 2 min to 240 min. After heat treatment, the evaluation of stage I and stage II as performed by optical metallography, XRD, hardness test. Both cast and hot rolled specimens had similar processing window. So grain size effect is not important to the austempered high carbon high silicon cast steel. When the austempering temperature was $260^{\circ}C$, the microstructure consisted of the lower ausferrite while the upper ausferrite structure was formed at $380^{\circ}C$. As the austempering temperature increases from 260 to $380^{\circ}C$, the strength and hardness decreased, elongaton and volume fraction of austenite increased. In addition, there was no change of mechanical properties between cast and hot-rolled specimens.

Random Backoff Scheme of Emergency Warning Message for Vehicle-to-Vehicle Communications (차량 간 통신에서 충돌을 완화하기 위한 랜덤 백오프 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.165-173
    • /
    • 2012
  • In this paper, we propose a random backoff scheme for Emergency Warning Messages (EWMs) in the vehicle-to-vehicle environment. The EWMs are disseminated from a vehicle that detects an emergency situation to other vehicles in a multi-hop fashion. Since the vehicle-to-vehicle communication based on IEEE 802.11 adapts CSMA/CA, the density of vehicles increase the probability of collisions between transmissions. Moreover, in the presence of background traffic, the EWM should have a higher priority than that of other messages in neighboring vehicles. To that end, we propose the Distant-Dependent Adaptive Backoff (DDAB) scheme, which set a different contention window for random backoff depending on the distance from the sender to the receiver. In the case when a vehicle is expected to located in the outskirts of the communication boundary, the proposed scheme makes the contention window size small in order to compete the background traffic transmission. Otherwise the contention window is set to a large number to reduce the collision possibility among the EWM transmissions. Via simulations, we show that the proposed scheme performs better than the previous schemes for EWM.

Heuristic Designs of SAD Correlation Algorithm for Vision System (비전 시스템 구현을 위한 SAD 정합 알고리즘의 변형)

  • Yi, Jong-Su;Kim, Jun-Seong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.61-66
    • /
    • 2010
  • A stereo vision, which is based on two or more images taken from different view points, is able to build three dimensional maps of its environment having various applications including robots and home networks. SAD algorithm, which is based on area-based correlation, is widely used since its regular structure provide abundant parallelism. In this paper, we present heuristic designs of SAD algorithm to meet the demands on accuracy and resource usages in various applications. The disparity abridgement and the window abridgement algorithms can be used for vision systems in low cost and small size. The window shape algorithm can be applicable when object are in specific shapes. The adaptive window algorithm work well when accuracy is the primary concern.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

Cooling Control of Greenhouse Using Roof Window Ventilation by Simple Fuzzy Algorithm (단순 퍼지 제어기법을 이용한 온실의 천창환기에 의한 냉방제어)

  • Min, Young-Bong;Yoon, Yong-Cheol;Huh, Moo-Ryong;Kang, Dong-Hyun;Kim, Hyeon-Tae
    • Journal of agriculture & life science
    • /
    • v.44 no.4
    • /
    • pp.69-77
    • /
    • 2010
  • Fuzzy control is widely used for improving temperature control performance as controlling ventilation in greenhouse because the technique can respond more flexibly to the outside air temperature and wind speed. By pre-studied PID and normal fuzzy control this study was performed to obtain the fundamental data that can be established in better greenhouse ventilation control method. The temperature control error by the simple fuzzy control was $1.2^{\circ}C$. The accumulated operating size of the window and the number of operating were 84% and 13, respectively. These showed equivalent control performance with pre-studied result that control error. The accumulated operating size of the window and the number of operating were 75% and 12, respectively. The proposed fuzzy technique was simple control logic method compared with step and PID control methods, but it showed equivalent performance. Therefore, the proposed simple fuzzy control method could be used in micro controller of small programmable memory size and many applications.