• Title/Summary/Keyword: Source of Information

Search Result 7,385, Processing Time 0.038 seconds

A Robust Vector Quantization Method against Distortion Outlier and Source Mismatch (이상 신호왜곡과 소스 불일치에 강인한 벡터 양자화 방법)

  • Noh, Myung-Hoon;Kim, Moo-Young
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.74-80
    • /
    • 2012
  • In resolution-constrained quantization, the size of Voronoi cell varies depending on probability density function of the input data, which causes large amount of distortion outliers. We propose a vector quantization method that reduces distortion outliers by combining the generalized Lloyd algorithm (GLA) and the cell-size constrained vector quantization (CCVQ) scheme. The training data are divided into the inside and outside regions according to the size of Voronoi cell, and consequently CCVQ and GLA are applied to each region, respectively. As CCVQ is applied to the densely populated region of the source instead of GLA, the number of centroids for the outside region can be increased such that distortion outliers can be decreased. In real-world environment, source mismatch between training and test data is inevitable. For the source mismatch case, the proposed algorithm improves performance in terms of average distortion and distortion outliers.

Microphone Array Design for Noise Source Imaging (소음원 영상화를 위한 마이크로폰 배열 설계)

  • ;Glegg, Stewart A.L.
    • Journal of KSNVE
    • /
    • v.7 no.2
    • /
    • pp.255-260
    • /
    • 1997
  • This paper describes 3-dimensional volume array of 4 microphones including a reference microphone which is capable of imaging wideband noise source position in 2-dimensional image plane. The cross correlation function and corresponding imaging function between a reference microphone and other microphone, are derived as a function of noise source position. The magnitude of the imaging function gives noise source mapping in image plane. Since the image plane is selective from a rectangular and a cylindrical plane, noise source position information such as range and bearing relative to the array is identified very much easily. Simulation results for typical source configurations confirms the applicability of the proposed array in noise control field.

  • PDF

Efficient Kernel Based 3-D Source Localization via Tensor Completion

  • Lu, Shan;Zhang, Jun;Ma, Xianmin;Kan, Changju
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.206-221
    • /
    • 2019
  • Source localization in three-dimensional (3-D) wireless sensor networks (WSNs) is becoming a major research focus. Due to the complicated air-ground environments in 3-D positioning, many of the traditional localization methods, such as received signal strength (RSS) may have relatively poor accuracy performance. Benefit from prior learning mechanisms, fingerprinting-based localization methods are less sensitive to complex conditions and can provide relatively accurate localization performance. However, fingerprinting-based methods require training data at each grid point for constructing the fingerprint database, the overhead of which is very high, particularly for 3-D localization. Also, some of measured data may be unavailable due to the interference of a complicated environment. In this paper, we propose an efficient kernel based 3-D localization algorithm via tensor completion. We first exploit the spatial correlation of the RSS data and demonstrate the low rank property of the RSS data matrix. Based on this, a new training scheme is proposed that uses tensor completion to recover the missing data of the fingerprint database. Finally, we propose a kernel based learning technique in the matching phase to improve the sensitivity and accuracy in the final source position estimation. Simulation results show that our new method can effectively eliminate the impairment caused by incomplete sensing data to improve the localization performance.

A Practical Physical-Layer Network Coding for Fading Channels

  • Jung, Bang-Chul
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.655-659
    • /
    • 2010
  • In the conventional PNC scheme, the relay node requires simultaneous transmission of two source nodes with strict power control and carrier-phase matching between two received symbols. However, this pre-equalization process at source nodes is not practical in fading channels. In this letter, we propose a novel physical-layer network coding (PNC) scheme with log-likelihood ratio (LLR) conversion for fading channels, which utilizes not pre-equalizer at transmitters (source nodes) but joint detector at receiver (relay node). The proposed PNC requires only channel side information at the receiver (CSIR), which is far more practical assumption in fading channels. In addition, the proposed PNC scheme can use the conventional modulation scheme like M-QAM regardless of modulation order, while the conventional PNC scheme requires reconfiguration of modulation scheme at the source nodes for detection of the received signal at relay node. We consider the combination of the proposed PNC and channel coding, and find that the proposed PNC scheme is easily combined the linear channel codes such as turbo codes, LDPC, and convolutional codes.

Ubiquitous Data Warehosue: Integrating RFID with Mutidimensional Online Analysis (유비쿼터스 데이터 웨어하우스: RFID와 다차원 온라인 분석의 통합)

  • Cho, Dai-Yon;Lee, Seung-Pyo
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.61-69
    • /
    • 2005
  • RFID is used for tracking systems in various business fields these days and these systems brought considerable efficiencies and cost savings to companies. Real-time based information acquired through RFID devices could be a valuable source of information for making decisions if it is combined with decision support tools like OLAP of a data warehouse that has originally been designed for analyzing static and historical data. As an effort of extending the data source of a data warehouse, RFID is combined with a data warehouse in this research. And OLAP is designed to analyze the dynamic real-time based information gathered through RFID devices. The implemented prototype shows that ubiquitous computing technology such as RFID could be a valuable data source for a data warehouse and is very useful for making decisions when it is combined with online analysis. The system architecture of such system is suggested.

New Driving Method of High Brightness LED Backlight Using Active Current Source

  • Hwang, S.;LEE, J.;Lim, S.;Oh, M.H.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08b
    • /
    • pp.1642-1645
    • /
    • 2007
  • The brightness of LED changes according to the current flowing through LEDs. The current mirror was used to drive LEDs effectively. The reference current of the current mirror was usually controlled by the resistor but the size of this resistor is very large and this resistor consumes too much power for high power LED backlight driving. The reference current of the current mirror LED driver was controlled by using flyback converter at small size with low power consumption in this paper. The concept of active current source was presented.

  • PDF

Source Identification in 2-Dimensional Scattering Field Based on Inverse Problem (역문제를 이용한 2차원 산란장에서의 소스 추정)

  • Kim, Tae Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1262-1268
    • /
    • 2014
  • Inverse problem is very interest in the sciences and engineering, in particular for modeling and monitoring applications. By applying inverse problem, it can be widely used to exploration of mineral resources, identification of underground cables and buried pipelines, and diagnostic imaging in medical area. In this paper, we firstly consider 2-dimensional EM scattering problem and present the FDTD method to estimate unknown source. In this case, non-linear CGM technique is used to investigate unknown sources corresponding to measured data obtained from forward problem in near field. The proposed technique for solving the inverse source problem presents a reasonable agreement and can be applied to investigate an internal source signal of embedded security module.

Simultaneous Wireless Information and Power Transfer in Two-hop OFDM Decode-and-Forward Relay Networks

  • Di, Xiaofei;Xiong, Ke;Zhang, Yu;Qiu, Zhengding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.152-167
    • /
    • 2016
  • This paper investigates the simultaneous wireless information and power transfer (SWIPT) for two-hop orthogonal frequency division multiplexing (OFDM) decode-and-forward (DF) relay network, where a relay harvests energy from radio frequency signals transmitted by a source and then uses the harvested energy to assist information transmission from the source to its destination. The power splitting receiver is considered at the relay. To explore the performance limit of such a SWIPT-enabled system, a resource allocation (RA) optimization problem is formulated to maximize the achievable information rate of the system, where the power allocation, the subcarrier pairing and the power splitting factor are jointly optimized. As the problem is non-convex and there is no known solution method, we first decompose it into two separate subproblems and then design an efficient RA algorithm. Simulation results demonstrate that our proposed algorithm can achieve the maximum achievable rate of the system and also show that to achieve a better system performance, the relay node should be deployed near the source in the SWIPT-enabled two-hop OFDM DF relay system, which is very different from that in conventional non-SWIPT system where the relay should be deployed at the midpoint of the line between the source and the destination.

A Study on Advertising Attitude, Brand Change Behavior and Information Acquisition Source for Airline SNS Content Marketing

  • PARK, Hye-Yoon;PARK, So-Yeon;KIM, Hye-Jin
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.2
    • /
    • pp.23-39
    • /
    • 2022
  • Purpose: This study aims to examine the effect of SNS, an important advertising means of airlines, on advertising attitudes and brand change behavior. It is intended to present practical implications by empirically analyzing demographic differences according to the source of SNS information acquisition. Research design, data and methodology: The questionnaire was revised to the contents of this study based on previous studies. It was conducted from June 15 to September 15, 2021. 297 copies were confirmed as valid samples and empirically analyzed. The proposed model was analyzed through path coefficient estimation. Results: SNS advertisement content has a positive effect on advertising attitude and brand change behavior. Advertising attitude has a positive effect on brand change behavior and has a mediating effect between advertising content and brand change behavior. There was a difference according to the source of information acquisition. Conclusions: This study suggested that when airlines engage in advertising using SNS, knowing and utilizing SNS content should be considered very important for airlines because it affects advertising attitudes and brand change behavior differently. This study is meaningful in that it can present the characteristics of SNS contents that can enhance advertising attitudes and brand change behavior when conducting marketing using SNS.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.