• Title/Summary/Keyword: blocking performance

Search Result 691, Processing Time 0.023 seconds

Implementation and Memory Performance Analysis of a Service Mobility Agent System to Support Service Mobility in Home Network (홈 네트워크 환경에서 서비스 이동성 지원을 위한 에이전트 구현 방안 및 메모리 성능 분석)

  • Nam, Jong-Wook;Yu, Myung-Ju;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.80-90
    • /
    • 2010
  • In this paper, we introduce some issues to implement an agent system to support service mobility in home network environment, and describe detailed design method in terminal as well as server agent. Specifically, we describe user recognition module, signaling message receiving/parsing module of terminal agent and signaling message receiving/parsing module, multimedia switching module, memory management module of server agent. We define several parameters managed in IP sharing device and design binding table structure to support mobility. And we utilize M/M/1/K queueing theory to obtain relations between memory size, blocking probability and memory utilization. From the obtained results, we show that memory size can be predicted in server agent mounted on IP sharing device.

Interference Analysis of the European Digital Terrestrial Broadcasting Service and the Personal/Portable TVBD based on Spectrum Cognition (유럽형 디지털 지상파 방송 서비스와 스펙트럼 인지 기반 개인/휴대형 TVBD와의 간섭분석)

  • Choi, Joo-Pyoung;Chang, Hyung-Min;Lee, Won-Cheol
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.1-7
    • /
    • 2012
  • In this paper, we was performed the interference analysis to determine an optimal coexisting criteria for the european digital video broadcasting service (DVB-T2) and the IMT-advanced LTE based TV Band Device (TVBD). The TVBD was equipped with the spectrum cognition method. To this end, we set the various transmission parameters, that includes the emission and blocking mask, antenna height and gain, transmission power and bandwidth, channel model etc. Based on this parameters, we were calculated the allowable transmit power, the number of TVBD and the change in probability of interference for the TVBD user operating in the adjacent channels of the DVB-T2 user. Also this paper presents how many TVBD users can sharing with DVB-T2 for spectral cognition performance.

Bandwidth Dimensioning for High-Speed Internet Access Networks (초고속인터넷 가입자망의 대역설계)

  • Lee, Tae-Joon;Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1017-1027
    • /
    • 2006
  • Recently, Internet service providers are offering triple play service which combines voice and video services with the existing high speed Internet service under the common network infrastructure of IP protocol, so that they can create more benefit from operating a single network architecture. In line with this movement in the convergence of network and services, in this work we propose a bandwidth dimensioning method for the subscriber network of the IP network at flow level. To that purpose, let us propose a series of bandwidth dimensioning methods: bandwidth for best effort service only, bandwidth dimensioning for premium services, and bandwidth dimensioning schemes for the premium Internet services as well as the best effort service which comprise the TPS. Our link dimensioning method is based on the flow level that incorporates the flow blocking probability as a measure of grade of services(GoS), and investigates the characteristics of the proposed methods via extensive numerical experiments. After that, let us carry out a simulation experiment concerning the delay and loss performance of the packet scheduling for the premium services (QoS) using the bandwidth designed by our proposed method, via which the packet level quality of service (QoS) for the proposed link dimensioning method can be observed.

Efficient Computation of Stream Cubes Using AVL Trees (AVL 트리를 사용한 효율적인 스트림 큐브 계산)

  • Kim, Ji-Hyun;Kim, Myung
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.597-604
    • /
    • 2007
  • Stream data is a continuous flow of information that mostly arrives as the form of an infinite rapid stream. Recently researchers show a great deal of interests in analyzing such data to obtain value added information. Here, we propose an efficient cube computation algorithm for multidimensional analysis of stream data. The fact that stream data arrives in an unsorted fashion and aggregation results can only be obtained after the last data item has been read. cube computation requires a tremendous amount of memory. In order to resolve such difficulties, we compute user selected aggregation fables only, and use a combination of an way and AVL trees as a temporary storage for aggregation tables. The proposed cube computation algorithm works even when main memory is not large enough to store all the aggregation tables during the computation. We showed that the proposed algorithm is practically fast enough by theoretical analysis and performance evaluation.

Design of Heliostat Field for 200kW Tower Type Solar Thermal Power Plant (200kW 탑형 태양열발전시스템의 Heliostat Field 설계)

  • Park, Young Chil
    • Journal of the Korean Solar Energy Society
    • /
    • v.32 no.5
    • /
    • pp.41-51
    • /
    • 2012
  • Heliostat field is the most important subsystem in the tower type solar thermal power plant since its optical performance affects the total system efficiency most significantly while the construction cost of it is the major part of total construction cost in such a power plant. Thus a well designed heliostat field to maximize the optical efficiency as well as to minimize the land usage is very important. This work presents methodology, procedures and result of heliostat filed design for 200kW solar thermal power plant built recently in Daegu, Korea. A $2{\times}2(m)$ rectangular shaped receiver located at 43(m) high and tilted $28^{\circ}$ toward heliostat field, 450 of heliostats of which the reflective surface is formed by 4 of $1{\times}1(m)$ flat plate mirror facet, and the land area having about $140{\times}120(m)$ size are used to form the heliostat field. A procedure to deploy 450 heliostats in radial staggered nonblocking formation is developed. Also the procedures to compute the cosine effect, intercept ratio, blocking and shading ratio in the field are developed. Finally the heliostat filed is designed by finding the optimal radial distance and azimuthal spacing in radial staggered nonblocking formation such that the designed heliostat field optical efficiency could be maximized. The designed heliostat field has 77% of annual average optical efficiency, which is obtained by annually averaging the optical efficiencies computed between the time of where sun elevation angle becomes $10^{\circ}$ after sunrise and the time of where sun elevation angle becomes $10^{\circ}$ before sunset in each day.

An Efficient Data-reuse Deblocking Filter Algorithm for H.264/AVC (H.264/AVC 비디오 코덱을 위한 효율적인 자료 재사용 디블록킹 필터 알고리즘)

  • Lee, Hyoung-Pyo;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.30-35
    • /
    • 2007
  • H.264/AVC provides better quality than other algorithms by using a deblocking filter to remove blocking distortion on block boundary of the decoded picture. However, this filtering process includes lots of memory accesses, which cause delay of overall decoding time. In this paper, we propose a data-reuse algorithm to speed up the process for the deblocking filter. To reuse the data, a new filtering order is suggested. By using this order, we reduce the memory access and accelerate the deblocking filter. The modeling of proposed algorithm is compiled under ARM ADS1.2 and simulated with Armulator. The results of the experiment compared with H.264/AVC standard are achieved on average 58.45% and 57.93% performance improvements at execution cycles and memory access cycles, respectively.

Implementation and Evaluation of Multiple Target Algorithm for Automotive Radar Sensor (차량용 레이더 센서를 위한 다중 타겟 알고리즘의 구현과 평가)

  • Ryu, In-hwan;Won, In-Su;Kwon, Jang-Woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.2
    • /
    • pp.105-115
    • /
    • 2017
  • Conventional traffic detection sensors such as loop detectors and image sensors are expensive to install and maintain and require different detection algorithms depending on the night and day and have a disadvantage that the detection rate varies widely depending on the weather. On the other hand, the millimeter-wave radar is not affected by bad weather and can obtain constant detection performance regardless of day or night. In addition, there is no need for blocking trafficl for installation and maintenance, and multiple vehicles can be detected at the same time. In this study, a multi-target detection algorithm for a radar sensor with this advantage was devised / implemented by applying a conventional single target detection algorithm. We performed the evaluation and the meaningful results were obtained.

Job Performance by Advanced Practice Nurses in Korea (한국 전문간호사의 업무 성과)

  • Kim, Mijung;Kim, Yeong Kyeong;Shin, Sujin
    • Korean Journal of Adult Nursing
    • /
    • v.26 no.6
    • /
    • pp.630-641
    • /
    • 2014
  • Purpose: The purpose of current study was to explore the positive outcomes of advanced practice nurse who have experienced the roles in their clinical settings. Methods: This study adopted a qualitative research design based on conventional content analysis. Participants were 16 nurse practitioners have been worked at hospitals or community centers. Data were collected via focus group interviews and analyzed using thematic analysis method. Results: Patients' aspect outcomes were "client-centered care in providing continuity", "providing trust based on expertise", "promoting skilled intervention in patient recovering", "blocking the negative consequences", "quality improvement: nursing becoming tighter", "providing total care for cases that require intensive care", "improving patients outcomes by total management", "increasing confidence in evidence-based professional nursing", "rising the satisfaction by cost-effective services", "providing skilled professional practice", and "providing comprehensive care related to covering various aspects". Other themes elicited also included "promoting efficacy by inter-related health professions supervising", "the expansion of specialized practice areas increase business efficiency", "formation of outside customers due to increasing the satisfaction with skilled nursing care", "filling in the emptying spaces of doctors by practicing reliable role to bridge", "attracting external customers through successful management of subjects", "increasing staff's satisfaction on the role to make a bridge between inside and outside doctors", "24 hours medical expertise of professional staff ready secured", and "low cost, same results, that is, cost-effective" in reference to health care resources aspect. Conclusion: These findings suggested that advanced practice nurses perceived various positive outcomes and provided basic data for outcome indicators of advanced practice nurses' role.

Satellite Mobility Pattern Scheme for Centrical and Seamless Handover Management in LEO Satellite Networks

  • Tuysuz, Aysegul;Alagoz, Fatih
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.451-460
    • /
    • 2006
  • Since low earth orbit (LEO) satellite constellations have important advantages over geosynchronous earth orbit (GEO) systems such as low propagation delay, low power requirements, and more efficient spectrum allocation due to frequency reuse between satellites and spotbeams, they are considered to be used to complement the existing terrestrial fixed and wireless networks in the evolving global mobile network. However, one of the major problems with LEO satellites is their higher speed relative to the terrestrial mobile terminals, which move at lower speeds but at more random directions. Therefore, handover management in LEO satellite networks becomes a very challenging task for supporting global mobile communication. Efficient and accurate methods are needed for LEO satellite handovers between the moving footprints. In this paper, we propose a new seamless handover management scheme for LEO satellites (SeaHO-LEO), which utilizes the handover management schemes aiming at decreasing latency, data loss, and handover blocking probability. We also present another interesting handover management model called satellite mobility pattern based handover management in LEO satellites (PatHO-LEO) which takes mobility pattern of both satellites and mobile terminals into account to minimize the handover messaging traffic. This is achieved by the newly introduced billboard manager which is used for location updates of mobile users and satellites. The billboard manager makes the proposed handover model much more flexible and easier than the current solutions, since it is a central server and supports the management of the whole system. To show the performance of the proposed algorithms, we run an extensive set of simulations both for the proposed algorithms and well known handover management methods as a baseline model. The simulation results show that the proposed algorithms are very promising for seamless handover in LEO satellites.

Measures for Adware and Spyware (애드웨어 및 스파이웨어 대응기법)

  • Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.41-47
    • /
    • 2006
  • Spyware is any technology that aids in gathering information about a person or organization with-out their knowledge. Software designed to serve advertising, known as adware, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. A piece of spyware and adware affect computers which can rapidly become infected with large numbers of spyware and adware components. Users frequently notice from un-wanted behavior and degradation of system performance, such as significant unwanted CPU activity, disk usage, and network traffic which thereby slows down legitimate uses of these resources. The presence of situation will continue because of rapid expansion of Internet usages. Therefore, security solutions, such as anti-adware and anti-spyware, for recovering these malfunction due to the malicious programs must be developed. However, studies on the malicious programs are still not sufficient. Accordingly, this paper has studied the malicious program techniques, based on the results of analysis of present adware and spyware techniques by employing collected samples, and presents efficient measures for blocking and remedying the malicious programs.

  • PDF