• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.027 seconds

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.

Performance Advantage of Partial CoMP Transmission Using Finite Feedback (제한적 궤환량 사용 시 부분적 CoMP 전송의 성능 이득)

  • Park, Jae-Yong;Sung, Won-Jin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.14-20
    • /
    • 2012
  • CoMP(Coordinated Multi-Point transmission and reception) refers to a cooperative transmission strategy to control the interference from adjacent base stations in cellular mobile communication systems, which efficiently enhances the data throughput of the systems. As the number of the base stations participating in cooperative transmission increases, however, a larger amount of information exchange to carry the CSI(Channel State Information) of the mobile terminals is required. In this paper, we propose a partial CoMP transmission method for systems under the constraint of finite feedback information data. This method selects candidates of base stations which can provide high efficiency gain when they participate in the CoMP set. To achieve this, the cooperative base station combination is constructed by considering the preferred base stations of users. The cooperative base station combinations are dynamically applied since the preferred base station combinations of users may be different. We perform computer simulations to compare performance of the non-CoMP, full-CoMP and partial CoMP in terms of the average throughput using finite feedback and demonstrate the performance improvement of the proposed method.

Design of the Digital Neuron Processor and Development of the Algorithm for the Real Time Object Recognition in the Making Automatic System (생산자동화 시스템에서 실시간 물체인식을 위한 디지털 뉴런프로세서의 설계 및 알고리즘 개발)

  • Hong, Bong-Wha;Lee, Seung-Joo
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.11-23
    • /
    • 2003
  • We proposes that Design of the Digital Neuron Processor and Development of the Algorithm for the real time object recognition in the making Automatic system which uses the residue number system making the high speed operation possible without carry propagation, in this paper. Consisting of MAC(Multiplication and Accumulation) operator unit using Residue number system and sigmoid function operator unit using Mixed Residue Conversion is designed. The Designed circuits are descripted by C language and VHDL and synthesized by Compass tools. Finally, the designed processor is fabricated in 0.8${\mu}m$ CMOS process. Result of simulations shows that critical path delay time is about 19nsec and operation speed is 0.6nsec and the size can be reduced to 1/2 times co pared to the neural networks implemented by the real number operation unit. The proposed design the digital neuron processor can be implemented of the object recognition in the making Automatic system with desired real time processing.

  • PDF

The Study of Data Classification Rethesis on Korea Government DRM (Data Reference Model) - The Establishment of New Data Principal, Classfication and Case Verification - (범정부 데이터 참조모형 데이터 분류체계 재정립에 관한 연구 - 데이터 분류 원칙, 체계수립 및 사례 검증 -)

  • Koo, Ja-Myon;Park, Joo-Seok;Shin, Daul
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.187-197
    • /
    • 2012
  • The investment on informatization has caused the increase in complexity of IT resources as well as inefficiency of Information system management and redundant investment. Thus, the idea of EA (Enterprise Architecture) was developed in order to manage the IT resources efficiently but the systematical guideline was insufficiently provided in data area.. Because of this, it is necessary to make full use of DRM (Data Reference Model) so we can enhance the sharing and reuse of data between several institutions in public sector by extracting and managing data behind processes. In this study, we recognize the necessity of improvement on data classification which is highly utilized and present the direction for the data classification rethesis.

Retrieval algorithm for Web Document using XML DOM (XML DOM을 이용한 웹문서 검색 알고리즘)

  • 김노환;정충교
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Until recently Web retrieval engine has presented a demanded document to users according to the amount and the frequency of inquired key words in each document under the assumption that the more key words a document has, the more accessible it is. This method of searching doesn't matter to a normal document such as HTML Web data in which structural information is not involved. However, Web data realized in XML contains structural information and modeling of graphic forms is also available. Therefore, in the case of XML, this method leads to no less trouble since it depends only on the frequency of key words. We consider that this problem can be resolved by way of inquiry which is similar to SQL. This form of inquiry enables us to snatch an exact data we want in a quick and clear way with a full advantage of structural quality of XML, overcoming the shortcomings of frequency-based engine. In this paper, We aim to design a model of information retrieval system of XML data using XML DOM and consider its algorithm related with it.

  • PDF

Motion Estimation Method by Using Depth Camera (깊이 카메라를 이용한 움직임 추정 방법)

  • Kwon, Soon-Kak;Kim, Seong-Woo
    • Journal of Broadcast Engineering
    • /
    • v.17 no.4
    • /
    • pp.676-683
    • /
    • 2012
  • Motion estimation in video coding greatly affects implementation complexity. In this paper, a reducing method of the complexity in motion estimation is proposed by using both the depth and color cameras. We obtain object information with video sequence from distance information calculated by depth camera, then perform labeling for grouping pixels within similar distances as the same object. Three search regions (background, inside-object, boundary) are determined adaptively for each of motion estimation blocks within current and reference pictures. If a current block is the inside-object region, then motion is searched within the inside-object region of reference picture. Also if a current block is the background region, then motion is searched within the background region of reference picture. From simulation results, we can see that the proposed method compared to the full search method remains the almost same as the motion estimated difference signal and significantly reduces the searching complexity.

Real-Time Full Accounting Management System in Multi-services Access Integrated Network : Design and Implementation (다중 서비스망 환경에서의 실시간 과금 관리 시스템설계 및 구현)

  • Chang, Beom-Hwan;Kim, Jong-Min;Go, Byung-Do;Chung, Tai-Myoung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.254-264
    • /
    • 2000
  • The billing techniques to support multiple services in an ATM based broadband access network have been rarely developed. In fact, the management techniques including accounting management have only focused on a single service environment such as PSTN thus far. In this paper, we present an accounting management system, called rtFAMS, designed and implemented to provide multiple Value Added Service Providers (VASPS) the charging records for the multiple services in a broadband access network. The architecture is based on OSI system management infrastructure and TMN Q3 interface to acquire accounting information from agents in the ATM cross-connecters as well as to process the billing mechanisms in the manager. This system Is designed to actively adopt the rapidly changing service environments and B-ISDN network management techniques. It also provides real-time accounting information to users using Web in addition to supplying the billing records to VASPs.

  • PDF

Diversification, Industry Concentration, and Bank Margins: Empirical Evidence from an Emerging South Asian Economy

  • SARWAR, Bilal;MUHAMMAD, Noor;ZAMAN, Nadeem Uz
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.7
    • /
    • pp.349-360
    • /
    • 2020
  • The study aims to empirically examine the determinants of bank margins from Pakistan, an emerging South Asian economy. To elucidate the importance of the Pakistani banking sector, secondary data has been used, which was extracted from the annual accounts of twenty-four Pakistani scheduled commercial banks (20 conventional, four full-fledged Islamic) over a sample period of 2006 to 2017. The factors identified in the dealership model and the subsequent empirical developments in the dealership model categorized as bank-specific, diversification, regulatory, and industry concentration are analyzed by applying the most-common linear dynamic panel-data estimator, the Generalized Method of Moments (GMM) estimator, developed by Arellano and Bond (1991). The findings reveal that, among the bank-specific variables, funding cost, credit risk, managerial efficiency, market share, and operating cost are significant predictors of bank margins. For diversification variables employed in the study, both variables including net non-interest income and asset diversity are as well significant predictors of bank margins. It is also found that the market concentration variable proxied by the Herfindahl-Hirschman Index (HHI) is significantly predicting bank margins. Subsequently, one of the regulatory variables, the opportunity cost of holding reserves, and one bank-specific variable, the degree of risk aversion, are insignificant in the model.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Iterative Detection and ICI Cancellation for MISO-mode DVB-T2 System with Dual Carrier Frequency Offsets

  • Jeon, Eun-Sung;Seo, Jeong-Wook;Yang, Jang-Hoon;Paik, Jong-Ho;Kim, Dong-Ku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.702-721
    • /
    • 2012
  • In the DVB-T2 system with a multiple-input single-output (MISO) transmission mode, Alamouti coded orthogonal frequency division multiplexing (OFDM) signals are transmitted simultaneously from two spatially separated transmitters in a single frequency network (SFN). In such systems, each transmit-receive link may have a distinct carrier frequency offset (CFO) due to the Doppler shift and/or frequency mismatch between the local oscillators. Thus, the received signal experiences dual CFOs. This not only causes dual phase errors in desired data but also introduces inter-carrier interference (ICI), which cannot be removed completely by simply performing a CFO compensation. To overcome this problem, this paper proposes an iterative detection with dual phase errors compensation technique. In addition, we propose a successive-iterative ICI cancellation technique. This technique successively eliminates ICI in the initial iteration by exploiting pre-detected data pairs. Then, in subsequent iterations, it performs a fine interference cancellation using a priori information, iteratively fed back from the channel decoder. In contrast to previous works, the proposed techniques do not require estimates of dual CFOs. Their performances are evaluated via a full DVB-T2 simulator. Simulation results show that the DVB-T2 receiver equipped with the proposed dual phase errors compensation and the successive-iterative ICI cancellation techniques achieves almost the same performance as ideal dual CFOs-free systems, even for large dual CFOs.