• Title/Summary/Keyword: data complexity

Search Result 2,389, Processing Time 0.029 seconds

Deisgn of adaptive array antenna for tracking the source of maximum power and its application to CDMA mobile communication (최대 고유치 문제의 해를 이용한 적응 안테나 어레이와 CDMA 이동통신에의 응용)

  • 오정호;윤동운;최승원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2594-2603
    • /
    • 1997
  • A novel method of adaptive beam forming is presented in this paper. The proposed technique provides for a suboptimal beam pattern that increases the Signal to Noise/Interference Ratio (SNR/SIR), thus, eventually increases the capacity of the communication channel, under an assumption that the desired signal is dominant compared to each component of interferences at the receiver, which is precoditionally achieved in Code Division Multiple Access (CDMA) mobile communications by the chip correlator. The main advantages of the new technique are:(1)The procedure requires neither reference signals nor training period, (2)The signal interchoerency does not affect the performance or complexity of the entire procedure, (3)The number of antennas does not have to be greater than that of the signals of distinct arrival angles, (4)The entire procedure is iterative such that a new suboptimal beam pattern be generated upon the arrival of each new data of which the arrival angle keeps changing due tot he mobility of the signal source, (5)The total amount of computation is tremendously reduced compared to that of most conventional beam forming techniques such that the suboptimal beam pattern be produced at vevery snapshot on a real-time basis. The total computational load for generating a new set of weitht including the update of an N-by-N(N is the number of antenna elements) autocovariance matrix is $0(3N^2 + 12N)$. It can further be reduced down to O(11N) by approximating the matrix with the instantaneous signal vector.

  • PDF

A Study on the Effectiveness of e-Trade Marketing for Export Performance (전자무역 마케팅의 수출 성과에 대한 효과성 분석)

  • Kim, Hag-Min
    • International Commerce and Information Review
    • /
    • v.13 no.2
    • /
    • pp.3-26
    • /
    • 2011
  • The objective of this study is to improve export performance using e-Trade marketing systems. The use of e-Trade has been increasing but there is some controversy about the performance of e-Trade marketing for Small-to-Medium enterprises (SME). The research construct for determining the export performance is suggested and five factors are introduced in this paper such as: B2B relationship and cooperation, product complexity, online fitness, level of internationalization, and use of e-Trade marketing. Sample data were collected from the companies who are familiar with the e-Trade systems. The result shows that the use of e-Trade marketing mostly contributes to the increase of export performance. The regression and cluster analysis shows that both variables of e-Trade marketing and on-line fitness are significant to high export performance group. The implication for SMEs is that the use of e-Trade marketing methods could contribute to the increase of export performance and more analytical works need to be made for future study.

  • PDF

A 200-MHz@2.5V 0.25-$\mu\textrm{m}$ CMOS Pipelined Adaptive Decision-Feedback Equalizer (200-MHz@2.5-V 0.25-$\mu\textrm{m}$ CMOS 파이프라인 적응 결정귀환 등화기)

  • 안병규;이종남;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.465-469
    • /
    • 2000
  • This paper describes a single-chip full-custom implementation of pipelined adaptive decision-feedback equalizer (PADFE) using a 0.25-${\mu}{\textrm}{m}$ CMOS technology for wide-band wireless digital communication systems. To enhance the throughput rate of ADFE, two pipeline stage are inserted into the critical path of the ADFE by using delayed least-mean-square (DLMS) algorithm Redundant binary (RB) arithmetic is applied to all the data processing of the PADFE including filter taps and coefficient update blocks. When compared with conventional methods based on two's complement arithmetic, the proposed approach reduces arithmetic complexity, as well as results in a very simple complex-valued filter structure, thus suitable for VLSI implementation. The design parameters including pipeline stage, filter tap, coefficient and internal bit-width and equalization performance such as bit error rate (BER) and convergence speed are analyzed by algorithm-level simulation using COSSAP. The singl-chip PADFE contains about 205,000 transistors on an area of about 1.96$\times$1.35-$\textrm{mm}^2$. Simulation results show that it can safely operate with 200-MHz clock frequency at 2.5-V supply, and its estimated power dissipation is about 890-mW.

  • PDF

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

Performance Analysis of Multicarrier Code Selection CDMA System for PAPR Reduction in Multipath Fading Channel (PAPR을 줄이기 위한 Multicarrier Code Select CDMA시스템의 다중 경로 페이딩 채널에서 성능 분석)

  • Ryu Kwan Woong;Park Yong Wan;Hong Een Kee;Kim Myovng Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12A
    • /
    • pp.1319-1332
    • /
    • 2004
  • Multicarrier direct sequence code-division multiple access CDMA(MC DS-CDMA) is an attractive technique for achieving high data rate transmission even if the potentially large peak-to-average power ratio(PAPR) is an important factor for its application. On the other hand, code select CDMA(CS-CDMA) is an attractive technique with constant amplitude transmission of multicode signal irregardless of subchannels by introducing code selection method. In this paper we propose a new multiple access scheme based on the combination of MC DS-CDMA and CS-CDMA. Proposed scheme, which we called MC CS-CDMA, includes the sutclasses of MC DS-CDMA and CS-CDMA as special cases. The performance of this system is investigated for multipath Sequency selective fading channel and maximal ratio combining with rake receiver. In addition the PAPR of proposed system is compare with that of both MC BS-CDMA and CS-CDMA. Simulation results show that proposed system improves PAPR reduction than MC DS-CDMA at the expense of the complexity of receiver and the number of available non. Also, the numerical result shows that the proposed system is better performance than MC DS-CDMA due to the increasing processing gain and the number of time diversity gain.

A Study on the Usefulness of Backend Development Tools for Web-based ERP Customization (Web기반 ERP 커스터마이징을 위한 백엔드 개발도구의 유용성 연구)

  • Jung, Hoon;Lee, KangSu
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.53-61
    • /
    • 2019
  • The risk of project failure has increased recently as ERP systems have been transformed into Web environments and task complexity has increased. Although low-code platform development tools are being used as a way to solve this problem, limitations exist as they are centered on UI. To overcome this, back-end development tools are required that can be developed quickly and easily, not only from the front development but also from a variety of development sources produced from the ERP development process, including back-end business services. In addition, the development tools included within existing ERP products require a lot of learning time from the perspective of beginner and intermediate developers due to high entry barriers. To address these shortcomings, this paper seeks to study ways to overcome the limitations of existing development tools within the ERP by providing customized development tool functions by enhancing the usability of ERP development tools suitable for each developer's skills and roles based on the requirements required by ERP development tools, such as reducing the time required for querying, automatic binding of data for testing for service-based units, and checking of source code quality.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

The Analysis of Relationship between Science Contents and Cognitive Domain of Students in Elementary Schools Through Multiple Choice items of TIMSS 2011 (TIMSS 2011의 선다형 공개 문항을 통한 초등학생의 과학 내용영역과 인지영역의 관계 분석)

  • Jeon, Seongsoo;Park, Jong-Ho
    • Journal of The Korean Association For Science Education
    • /
    • v.35 no.3
    • /
    • pp.487-498
    • /
    • 2015
  • This research is for acquiring implications to science education based on learner's characteristics by analyzing the relationship between contents on science learning and cognitive domain of students in elementary schools through TIMSS 2011-based academic achievement test. Forty one multiple choice items from by TIMSS 2011 were used on 317 primary school students, fourth to sixth grade, and according to grade and achievement level of research targets, test results were analyzed. With these data, the relationship between contents on science learning and the score by cognitive domains, and through correlation by items, we drew static and negative correlations, and then compared the value. The result are as follows: First, other fields except for 'physical science' and 'inference' revealed meaningful differences by learners' grade, and the interrelationship between all contents domains and cognitive fields also appeared statically different. Second, both achievement level of contents and cognition of learners presented significant differences, but the correlation between scientific contents and cognitive field of learners showed different aspects. Third, in static and negative correlation by items, the complexity and their aspects could be classified by targets' academic achievement levels.

Low-Cost Elliptic Curve Cryptography Processor Based On Multi-Segment Multiplication (멀티 세그먼트 곱셈 기반 저비용 타원곡선 암호 프로세서)

  • LEE Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.8 s.338
    • /
    • pp.15-26
    • /
    • 2005
  • In this paper, we propose an efficient $GF(2^m)$ multi-segment multiplier architecture and study its application to elliptic curve cryptography processors. The multi-segment based ECC datapath has a very small combinational multiplier to compute partial products, most of its internal data buses are word-sized, and it has only a single m bit multiplexer and a single m bit register. Hence, the resource requirements of the proposed ECC datapath can be minimized as the segment number increases and word-size is decreased. Hence, as compared to the ECC processor based on digit-serial multiplication, the proposed ECC datapath is more efficient in resource usage. The resource requirement of ECC Processor implementation depends not only on the number of basic hardware components but also on the complexity of interconnection among them. To show the realistic area efficiency of proposed ECC processors, we implemented both the ECC processors based on the proposed multi-segment multiplication and digit serial multiplication and compared their FPGA resource usages. The experimental results show that the Proposed multi-segment multiplication method allows to implement ECC coprocessors, requiring about half of FPGA resources as compared to digit serial multiplication.

Development of an Aerodynamic Simulation for Studying Microclimate of Plant Canopy in Greenhouse - (1) Study on Aerodynamic Resistance of Tomato Canopy through Wind Tunnel Experiment - (공기유동해석을 통한 온실내 식물군 미기상 분석기술 개발 - (1) 풍동실험을 통한 토마토 식물군의 공기저항 연구 -)

  • Lee In-Bok;Yun Nam-Kyu;Boulard Thierry;Roy Jean Claude;Lee Sung-Hyoun;Kim Gyoeng-Won;Lee Seung-Kee;Kwon Soon-Hong
    • Journal of Bio-Environment Control
    • /
    • v.15 no.4
    • /
    • pp.289-295
    • /
    • 2006
  • A computational fluid dynamics (CFD) numerical model has been developed to effectively study the ventilation efficiency of multi-span greenhouses with internal crops. As the first step of the study, the internal plants of the CFD model had to be designed as a porous media because of the complexity of its physical shapes. In this paper, the results of the wind tunnel tests were introduced to find the aerodynamic resistance of the plant canopy. The Seogun tomato was used for this study which made significant effects on thermal and mass exchanges with the adjacent air as well as internal airflow resistance. With the main factors of wind speed, static pressure, and density of plant canopy, the aerodynamic resistance factor was statically found. It was finally found to be 0.26 which will be used later as an input data of the CFD model. Moreover, the experimental procedure of how to find the aerodynamic resistance of various plants using, wind tunnel was established through this study.