• Title/Summary/Keyword: block processing

Search Result 1,479, Processing Time 0.029 seconds

Performance Improvement of Space-Time OFDM System with Concatenated Codes (연접부호를 적용한 시공간 OFDM 시스템의 성능 개선)

  • 서완우;정연호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.541-546
    • /
    • 2004
  • Space-Time Coding(STC) is a technique that utilizes joint correlation of transmitted signals in both time and space domains. Through this approach, diversity and coding gains can be simultaneously obtained. In this paper, we use SPW simulation tool to implement the IEEE 802.11a system. Based on this system, OFDM system with STC and convolutional coder concatenated is implemented. The system performance is analyzed and compared with the performance of the IEEE 802.11a system. The simulation results show that the performance with concatenated codes at a data rate of 6Mbps shows approximately a 5dB gain over the system with the convolutional code only. At a data rate of 12Mbps, the performance with concatenated codes is further improved by approximately 6dB.

A Study of Privacy Protection for Users of Electronic Money Using Blockchain Technology (블록체인 기법을 사용하는 전자화폐 사용자의 프라이버시 보호에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.571-572
    • /
    • 2017
  • The blockchain technology that implements electronic money uses decentralized computing and all transactions in a blockchain are open to everyone. This technique seems to guarantee anonymity by performing the transaction on the address instead of the user, but by using direction acyclic graph based on the transaction graph, the privacy problem is caused by tracking the addresses. In this paper, we analyze various techniques for centralized processing which makes it difficult to find the relevance on the graph in order to protect the privacy in the block chain technology. We also analyze the techniques of anonymizing in a distributed way to enhance privacy. Using the zero knowledge proof scheme guarantees full distributed anonymity but requires more computation and storage space, and various techniques to make this efficient are proposed. In this paper, we propose a privacy protection scheme of blockchain technology to integrate existing privacy protection techniques into a blockchain technology and perform it more efficiently with a centralized or decentralized technique.

  • PDF

A Z-Index based MOLAP Cube Storage Scheme (Z-인덱스 기반 MOLAP 큐브 저장 구조)

  • Kim, Myung;Lim, Yoon-Sun
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.262-273
    • /
    • 2002
  • MOLAP is a technology that accelerates multidimensional data analysis by storing data in a multidimensional array and accessing them using their position information. Depending on a mapping scheme of a multidimensional array onto disk, the sliced of MOLAP operations such as slice and dice varies significantly. [1] proposed a MOLAP cube storage scheme that divides a cube into small chunks with equal side length, compresses sparse chunks, and stores the chunks in row-major order of their chunk indexes. This type of cube storage scheme gives a fair chance to all dimensions of the input data. Here, we developed a variant of their cube storage scheme by placing chunks in a different order. Our scheme accelerates slice and dice operations by aligning chunks to physical disk block boundaries and clustering neighboring chunks. Z-indexing is used for chunk clustering. The efficiency of the proposed scheme is evaluated through experiments. We showed that the proposed scheme is efficient for 3~5 dimensional cubes that are frequently used to analyze business data.

Virtual Machine Code Optimization using Profiling Data (프로파일링 데이터를 이용한 가상기계 코드 최적화)

  • Shin, Yang-Hoon;Yi, Chang-Hwan;Oh, Se-Man
    • The KIPS Transactions:PartA
    • /
    • v.14A no.3 s.107
    • /
    • pp.167-172
    • /
    • 2007
  • VM(Virtual Machine) can be considered as a software processor which interprets the machine code. Also, it is considered as a conceptional computer that consists of logical system configuration. But, the execution speed of VM system is much slower than that of a real processor system. So, it is very important to optimize the code for virtual machine to enhance the execution time. Especially the optimizer for a virtual machine code on embedded devices requires the highly efficient performance to the ordinary optimizer in the respect to the optimized ratio about cost. Fundamentally, functions and basic blocks which influence the execution time of virtual machine is found, and then an optimization for them nay get the high efficiency. In this paper, we designed and implemented the optimizer for the virtual(or abstract) machine code(VMC) using profiling. Firstly, we defined the profiling information which is necessary to the optimization of VMC. The information can be obtained from dynamically executing the machine code. And we implemented VMC optimizer using the profiling information. In our implementation, the VMC is SIL(Standard Intermediate Language) that is an intermediate code of EVM(Embedded Virtual Machine). Also, we tried a benchmark test for the VMC optimizer and obtained reasonable results.

Intermediate Image Generation based on Disparity Path Search in Block of Disparity Space Image (시차공간영상에서의 구간별 시차 경로 탐색을 이용한 중간 영상 생성)

  • Kwak, Ji-Hyun;Kim, Kyung-Tae
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.9-16
    • /
    • 2008
  • In this paper, we present an algorithm for synthesizing intermediate view image from a stereoscopic pair of images. An image of multiview is need for people in order to easily recognize 3D image. However, if many cameras are use for that, not only does system get more complicated but also transmission rating cause a big trouble. Hence, stereo images are photograph and issue on the sending side and algorithm to generate several intermediate view image is able to be use on the receiving side. The proposed method is based on disparity space image. First of all, disparity space image that is depicted by the gap of pixel followed by disparity of stereo image is generated. Disparity map is made by utilizing disparity space image for searching for optimal disparity path then eventual intermediate view image is generated after occlusion region which does not match is processed. Experimental results illustrate the performance of the proposed technique and we obtained a high quality image of more than 30 dB PSNR.

Facial Expression Recognition Using SIFT Descriptor (SIFT 기술자를 이용한 얼굴 표정인식)

  • Kim, Dong-Ju;Lee, Sang-Heon;Sohn, Myoung-Kyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.89-94
    • /
    • 2016
  • This paper proposed a facial expression recognition approach using SIFT feature and SVM classifier. The SIFT was generally employed as feature descriptor at key-points in object recognition fields. However, this paper applied the SIFT descriptor as feature vector for facial expression recognition. In this paper, the facial feature was extracted by applying SIFT descriptor at each sub-block image without key-point detection procedure, and the facial expression recognition was performed using SVM classifier. The performance evaluation was carried out through comparison with binary pattern feature-based approaches such as LBP and LDP, and the CK facial expression database and the JAFFE facial expression database were used in the experiments. From the experimental results, the proposed method using SIFT descriptor showed performance improvements of 6.06% and 3.87% compared to previous approaches for CK database and JAFFE database, respectively.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

An Implementation and Performance Evaluation of a RAID System Based on Embedded Linux (내장형 리눅스 기반 RAID 시스템의 구현 및 성능평가)

  • Baek, Sung-Hoon;Park, Chong-Won
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.451-458
    • /
    • 2002
  • In this article, we present, design, and implement a software and hardware for an embedded RAID system. The merits and drawbacks of our system are presented by performance evaluation. The proposed hardware system consists of three fibre channel controllers for the interface with fibre channel disks and hosts. Embedded Linux in which a RAID software is implemented is ported to the hardware. A SCSI target mode device driver and a target mode SCSI module are designed for that our RAID system is considered as a block device to a host computer. Linux Multi-device is used as RAID functions of this system. A data cache module is implemented for high performance and the interconnection between Linux Multi-device and the target mode SCSI module. The RAID 5 module of Multi-device is modified for improvement of read performance. The benchmark shows that the new RAID 5 module is superior to the original one in overall performance.

Metadata Management of a SAN-Based Linux Cluster File System (SAN 기반 리눅스 클러스터 파일 시스템을 위한 메타데이터 관리)

  • Kim, Shin-Woo;Park, Sung-Eun;Lee, Yong-Kyu;Kim, Gyoung-Bae;Shin, Bum-Joo
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.367-374
    • /
    • 2001
  • Recently, LINUX cluster file systems based on the storage area network (SAN) have been developed. In those systems, without using a central file server, multiple clients sharing the whole disk storage through Fibre Channel can freely access disk storage and act as file servers. Accordingly, they can offer advantages such as availability, load balancing, and scalability. In this paper, we describe metadata management schemes designed for a new SAN-based LINUX cluster file system. First, we present a new inode structure which is better than previous ones in disk block access time. Second, a new directory structure which uses extendible hashing is described. Third, we describe a novel scheme to manage free disk blocks, which is suitable for very large file systems. Finally, we present how we handle metadata journaling. Through performance evaluation, we show that our proposed schemes have better performance than previous ones.

  • PDF

Human Cytomegalovirus Inhibition of Interferon Signal Transduction

  • Miller, Daniel M.;Cebulla, Colleen M.;Sedmak, Daniel D.
    • Journal of Microbiology
    • /
    • v.38 no.4
    • /
    • pp.203-208
    • /
    • 2000
  • Cytomegalovirus (CMV), a beta-herpesvirus with worldwide distribution, exhibits host persistence, a distinguishing characteristic of all herpesviruses. This persistence is dependent upon restricted gene expression in infected cells as well as the ability of productively infected cells to escape from normal cell-mediated anti-viral immunosurveillance. Type I (IFN-$\alpha$/$\beta$) and type II (IFN-γ) interferons are major components of the innate defense system against viral infection. They are potent inducers of MHC class I and II antigens and of antigen processing proteins. Additionally, IFNS mediate direct antiviral effects through induction effector molecules that block viral infection and replications such as 2', 5-oligoadenylate synthetase (2, 5-OAS). IFNS function through activation of well-defined signal transduction pathways that involve phosphorylation of constituent proteins and ultimate formation of active transcription factors. Recent studies have shown that a number of diverse viruses, including CMV, EBV, HPV mumps and Ebola, are capable of inhibiting IFN-mediated signal transduction through a variety of mechanisms. As an example, CMV infection inhibits the ability of infected cells Is transcribe HLA class I and II antigens as well as the antiviral effector molecules 2, 5-OAS and MxA I. EMSA studies have shown that IFN-$\alpha$ and IFN-γ are unable to induce complete signal transduction in the presence of CMV infection, phenomena that are associated with specific decreases in JAKl and p48. Viral inhibition of IFN signal transduction represents a new mechanistic paradigm for increased viral survival, a paradigm predicting widespread consequences in the case of signal transduction factors common to multiple cytokine pathways.

  • PDF