• Title/Summary/Keyword: access and tracking

Search Result 189, Processing Time 0.026 seconds

Dynamic Spectrum Access Using Belief Vector Tracking Method for Other Competing Secondary Users (다른 이차사용자의 신뢰 벡터를 추적하여 이차사용자 사이의 충돌을 줄이기 위한 동적 스펙트럼 접속 방식)

  • Lee, Yutae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2547-2552
    • /
    • 2013
  • To achieve better performance in dynamic spectrum access networks, each secondary user tracks channels and chooses a good channel to transmit its packet. When all secondary users adopt the same dynamic spectrum access policy, they have similar channel information, which leads secondary users to choose the same channel and more collisions among them. To relieve this problem, we propose an access policy using belief vector tracking method for other competing secondary users. Simulation results are provided to show that the proposed policy yields better performance than the existing policies which do not take into account what other secondary users are doing.

Mechanism Design of Optical Pickup Actuator for Fast Access of Optical Disk Drive (광디스크 드라이브의 고속 액세스를 위한 광픽업 액추에이터 메커니즘 설계)

  • 박준혁;이상헌;백윤수
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.12
    • /
    • pp.109-119
    • /
    • 2002
  • In this paper, mechanism design of optical pickup actuator for fast access is proposed. This actuator is composed of moving magnet type actuator and moving coil type actuator for tracking and fine motion, respectively. Moving magnet type tracking actuator is configurated by two permanent magnets and four air-core solenoids. Additional damper by induced current in tracking actuator can reduce the transient vibration between the coarse seeking servo and fine seeking servo. Variable stiffness can be acquired by applying current to air-core solenoid simply. This actuator can achieve fast access by these additional damper and stiffness. Performance of this actuator is predicted through the FEM, simulation and simple experiment. Settling time for transient vibration is reduced to 14.7% according to simulation result.

Implementation of Location Tracking System of Wireless Access Point based PDA (PDA기반 무선 AP의 위치 탐색 시스템 구현)

  • Park, Ju-Pyung;Hong, Jin-Keun;Han, Kun-Hee;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.952-957
    • /
    • 2008
  • In this paper, explain about collect that Access Point signal and Implementation of Location Tracking System of Wireless Access Point based PDA. Collect Access point signal in PDA then Signal transmits by computer so Computer is analyze collected signal and is seen on picture. we show the Present problem of wireless LAN and position feeler algorithm through this writing paper.

Design of Model of Evidence System using the Single Cryptology and Network IP Tracking (1회용 암호와 네트워크 IP Tracking을 이용한 인증시스템의 설계)

  • Chae, Byeung-Soo;Tcha, Hong-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.2
    • /
    • pp.87-95
    • /
    • 2009
  • This research attempted to build up a system of security and identification for storage devices in a communication network. This identification Network System will configure security of information encoded and any computer data-medium by control of the access right of the user.

  • PDF

Effect of Imperfect Power Control on Performance of a PN Code Tracking Loop for a DS/CDMA System

  • Kim, Jin-Young
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.209-212
    • /
    • 2000
  • In this paper, effect of imperfect power control on performance of a pseudonoise (PN) code tracking loop is analyzed and simulated for a direct-sequence/code-division multiple access (DS/CDMA) system. The multipath fading channel is modeled as a two-ray Rayleigh fading model. Power control error is modeled as a log-normally distributed random variable. The tracking performance of DLL (delay-locked-loop) is evaluated in terms of tracking jitter and mean-time-to-lose-lock (MTLL). From the simulation results, it is shown that the PN tracking performance is very sensitive to the power control error.

  • PDF

Model-Following Control in Random Access Deviecs for Velocity Performance Enhancement (랜덤액세스 장치의 속도성능 향상을 위한 모델추종 제어기의 적용)

  • Lee, J.H;Park, K.H;Kim, S.H;Kwak, Y.K
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.1
    • /
    • pp.115-126
    • /
    • 1996
  • In the time optimal control problem, bang-bang control has been used becaese it is the theoretical time minimum solution. However, to improve tracking speed performance in the time optimal control, it is important to select a switching point accurately which makes the velocity zero near the target track. But it is not easy to select the swiching point accurately because of the damping coefficient variation and uncertainties of modeling an actual system. The Adaptive model following control(AMFC) is implemented to relieve the difficulty and inconvenience of this task. The AMFC and make the controlled plant follow as closely as possible to a desired reference model whose switching point can be calculated easily and accurately, assuring the error between the states of the reference model and those of the controlled plant appoaches zero. The hybrid control method composed of AMFC and PID is applied to a tracking actuator of the magneto optical disk drive(MODD) in random access devices to improve its slow tracking performance. According to the simulaion and experimental results, the average tracking time as small as 20ms is obtained for a 3.5 magneto-optical disk drive. The AMFC also can be applied for other random access devices to improve the average tracking performance.

Development of a Dynamic Collision Avoidance Algorithm for Indoor Tracking System Based on Active RFID

  • Han, Se-Kyung;Choi, Yeon-Suk;Iwai, Masayuki;Sezaki, Kaoru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.736-752
    • /
    • 2010
  • We propose a novel collision-avoidance algorithm for the active type RFID regarding an indoor tracking system. Several well-known collision avoidance algorithms are analyzed considering the adequacy for the indoor tracking system. We prove the superiority of the slotted ALOHA in comparison with CSMA for short and fixed length packets like an ID message in RFID. Observed results show that they are not applicable for active type RFID in terms of energy efficiency. Putting these all together, we propose a dedicated collision avoidance algorithm considering the unique features of the indoor tracking system. The proposed method includes a scheduled tag access period (STAP) as well as a random tag access period (RTAP) to address both of the static and dynamic characteristics of the system. The system parameters are determined through a quantitative analysis of the throughput and energy efficiency. Especially, some mathematical techniques have been deployed to obtain the optimal slot count for RTAP. Finally, simulation results are provided to illustrate the performance of the proposed method with variations of the parameters.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

Performance of PN Code Tracking Loop for a DS/CDMA System with Imperfect Power Control and Shadowing

  • Kim, Jin-Young
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.501-504
    • /
    • 2000
  • In this paper, performance of a pseudonoise (PN) code tracking loop is analyzed and simulated for a direct-sequence/code-division multiple access ( DS/CDMA) system with imperfect power control in a multipath fading channel. A noncoherent first-order delay-locked loop (DLL) is considered as a PN code tracking loop. Power control error is modeled as a log-normally distributed random variable. From the simulation results, it is shown that for smaller discriminator offset, tracking jitter performance is improved while MTLL performance is degraded. It is shown that large power control error and heavy shadowing substantially degrade the PN tracking performance. The analysis in this paper can be applicable to design of PN code tracking loop for a DS/CDMA system.

  • PDF

A Computer Access System for the Physically Disabled Using Eye-Tracking and Speech Recognition (아이트래킹 및 음성인식 기술을 활용한 지체장애인 컴퓨터 접근 시스템)

  • Kwak, Seongeun;Kim, Isaac;Sim, Debora;Lee, Seung Hwan;Hwang, Sung Soo
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.5-15
    • /
    • 2017
  • Alternative computer access devices are one of the ways for the physically disabled to meet their desire to participate in social activities. Most of these devices provide access to computers by using their feet or heads. However, it is not easy to control the mouse by using their feet, head, etc. with physical disabilities. In this paper, we propose a computer access system for the physically disabled. The proposed system can move the mouse only by the user's gaze using the eye-tracking technology. The mouse can be clicked through the external button which is relatively easy to press, and the character can be inputted easily and quickly through the voice recognition. It also provides detailed functions such as mouse right-click, double-click, drag function, on-screen keyboard function, internet function, scroll function, etc.