• 제목/요약/키워드: knowledge/information networks

검색결과 435건 처리시간 0.026초

Opportunistic Spectrum Access Based on a Constrained Multi-Armed Bandit Formulation

  • Ai, Jing;Abouzeid, Alhussein A.
    • Journal of Communications and Networks
    • /
    • 제11권2호
    • /
    • pp.134-147
    • /
    • 2009
  • Tracking and exploiting instantaneous spectrum opportunities are fundamental challenges in opportunistic spectrum access (OSA) in presence of the bursty traffic of primary users and the limited spectrum sensing capability of secondary users. In order to take advantage of the history of spectrum sensing and access decisions, a sequential decision framework is widely used to design optimal policies. However, many existing schemes, based on a partially observed Markov decision process (POMDP) framework, reveal that optimal policies are non-stationary in nature which renders them difficult to calculate and implement. Therefore, this work pursues stationary OSA policies, which are thereby efficient yet low-complexity, while still incorporating many practical factors, such as spectrum sensing errors and a priori unknown statistical spectrum knowledge. First, with an approximation on channel evolution, OSA is formulated in a multi-armed bandit (MAB) framework. As a result, the optimal policy is specified by the wellknown Gittins index rule, where the channel with the largest Gittins index is always selected. Then, closed-form formulas are derived for the Gittins indices with tunable approximation, and the design of a reinforcement learning algorithm is presented for calculating the Gittins indices, depending on whether the Markovian channel parameters are available a priori or not. Finally, the superiority of the scheme is presented via extensive experiments compared to other existing schemes in terms of the quality of policies and optimality.

DAA 자바 실험모듈 구현을 통한 모바일 DAA 모델 설계 (Design of a Mobile DAA Model through Java Test Module for the DAA Protocol)

  • 양석환;이기열;정목동
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권8호
    • /
    • pp.773-777
    • /
    • 2008
  • 오늘날의 모바일 장비들은 무작위로 움직이는 이동성을 가지고 있어서 보안에 대한 다양한 요구사항을 가지고 있으며 이러한 요구사항을 충족시키기 위해 모바일 장비에 대한 보안기술과 인증기술에 대한 많은 연구가 진행 중이다. 이를 위하여 TCG(Trusted Computing Group)에서는 사용자의 프라이버시를 보호하는 동시에 강력한 인증방법을 제공하기 위하여 보안칩에 해당하는 TPM(Trusted Platform Module)을 설계하고 영지식 증명을 이용한 DAA(Direct Anonymous Attest처ion) 프로토콜을 제시하고 있다. 본 논문에서는 자바를 이용하여 DAA 프로토콜을 소프트웨어로 구현하고 이를 바탕으로 해서 모바일 환경에 적합한 모바일 DAA 모델을 제시한다.

Innovation Capabilities and Small and Medium Enterprises' Performance: An Exploratory Study

  • ALI, Hazem;HAO, Yunhong;AIJUAN, Chen
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권10호
    • /
    • pp.959-968
    • /
    • 2020
  • Research underlined that Small and Medium Enterprises' performance is enhanced by different types of innovation capabilities. This research tends to present a comprehensive model to explain the relationship between innovation capabilities and SMEs' financial and operational performance. Specifically, this study tends to achieve three objectives: explores the set of product, process, organizational and marketing innovation capabilities possessed by owners/managers of SMEs and their impact on Chinese manufacturing SMEs' operational and financial performance dimensions, identify the determinants of innovation capabilities, and determine the contextual factors that moderate innovation capabilities and SMEs' performance. This research employed a qualitative research method using in-depth interviews with eight owners/managers of Chinese manufacturing SMEs. Research findings revealed that product and marketing innovation capabilities have a significant impact on SMEs' financial performance while process and organizational innovation capabilities positively influence SMEs' operational performance. The major determinants of innovation capabilities involved availability of sufficient organizational resources, entrepreneurial orientation, knowledge development and external networks. The contextual moderating factors on the relationship between innovation capabilities and SMEs' performance involved internal factors which are: SME size, SMEs' owner/manager work experience, entrepreneurial mindset; and external factors: market dynamism and cooperation strategies. This paper ends by drawing some concluding remarks and proposing future research avenues.

Differential Functions of Ras for Malignant Phenotypic Conversion

  • Moon Aree
    • Archives of Pharmacal Research
    • /
    • 제29권2호
    • /
    • pp.113-122
    • /
    • 2006
  • Among the effector molecules connected with the group of cell surface receptors, Ras proteins have essential roles in transducing extracellular signals to diverse intracellular events, by controlling the activities of multiple signaling pathways. For over 20 years since the discovery of Ras proteins, an enormous amount of knowledge has been accumulated as to how the proteins function in overlapping or distinct fashions. The signaling networks they regulate are very complex due to their multiple functions and cross-talks. Much attention has been paid to the pathological role of Ras in tumorigenesis. In particular, human tumors very frequently express Ras proteins constitutively activated by point mutations. Up to date, three members of the Ras family have been identified, namely H-Ras, K-Ras (A and B), and N-Ras. Although these Ras isoforms function in similar ways, many evidences also support the distinct molecular function of each Ras protein. This review summarizes differential functions of Ras and highlights the current view of the distinct signaling network regulated by each Ras for its contribution to the malignant phenotypic conversion of breast epithelial cells. Four issues are addressed in this review: (1) Ras proteins, (2) membrane localization of Ras, (3) effector molecules downstream of Ras, (4) Ras signaling in invasion. In spite of the accumulation of information on the differential functions of Ras, much more remains to be elucidated to understand the Ras-mediated molecular events of malignant phenotypic conversion of cells in a greater detail.

BMC를 활용한 공유경제 기반의 스마트워크센터 모델 연구 (A Study on the Smart Work Center Model Based on the Sharing Economy Using the BMC(Business Model Canvas))

  • 이유미;임명환
    • Journal of Information Technology Applications and Management
    • /
    • 제20권4호
    • /
    • pp.165-189
    • /
    • 2013
  • The advance of the smart working environment came the expectation that it would innovate and revolutionize the way people work, particularly in a society where smart work is readily available for creating a collaborative and 'connected' business. One of the core infrastructure elements for making smart work a viable option is the smart work center, the promotion of which requires a new form of 'smart work center business model' that can satisfy the purposes of both public services and private businesses. This calls for collaboration between the public and private sectors. Recently a number of businesses have been making significant headway in the creation of a new environment for business support and collaboration by adopting a sharing economy business model in their offices. The so-called 'Coworking Space' is an advanced form of business environment in the emerging 'smart work' era, and comes with the benefits of reduced costs as a result of sharing office space and knowledge sharing through the use of human networks. This paper describes the framework of a 'smart work center business model based on the sharing economy' using a BMC (Business Model Canvas), with an understanding of the characteristics inherent to the smart work center and the sharing economy. It was on the basis of this framework that a smart work center model for business incubation and startup, a private smart work center model for childcare services, and a community marketplace model with a global network were developed.

BcN에서 유비쿼터스주소 체계 및 네트워크구조 연구 (Study on architecture of u-number system and network)

  • 정희창;이영로
    • 대한전자공학회논문지TC
    • /
    • 제42권12호
    • /
    • pp.71-76
    • /
    • 2005
  • E.164와 IP주소가 지원되는 070-VOIP 서비스가 시작되었다. 유${\cdot}$무선통합의 멀티미디어컨버젼스 서비스에서 EPC와 IP 주소를 E.164 주소로 융합하는 주소체계를 제안하였다. 향후 BcN네트워크에서 엔드유저는 E.164를 기반으로 하는 통합된 주소체계를 이용할 수 있는 방안을 제시하였다. 유비쿼터스 주소체계는 IP기반의 E.164 주소체계를 이용하여 통합된 하나의 주소체계를 적용함으로서 모든 사물에 지능화시에 확장성이 용이할 것이다.

A Generalized Blind Adaptive Multi-User Detection Algorithm for Multipath Rayleigh Fading Channel Employed in a MIMO System

  • Fahmy Yasmine A.;Mourad Hebat-Allah M.;Al-Hussaini Emad K.
    • Journal of Communications and Networks
    • /
    • 제8권3호
    • /
    • pp.290-296
    • /
    • 2006
  • In this paper, a generalized blind adaptive algorithm is introduced for multi-user detection of direct sequence code division multiple access (OS-COMA) wireless communication systems. The main property of the proposed algorithm is its ability to resolve the multipath fading channel resulting in inter symbol interference (ISI) as well as multiple access interference (MAI). Other remarkable properties are its low complexity and mitigation to the near-far problem as well as its insensitivity to asynchronous transmission. The proposed system is based on the minimization of the output energy and convergence to the minimum mean square error (MMSE) detector. It is blind in the sense that it needs no knowledge of the other users' signatures, only the intended user signature and timing are required. Furthermore, the convergence of the minimum output energy (MOE) detector to the MMSE detector is analytically proven in case of M-ary PSK. Depicted results show that the performance of the generalized system dominates those previously considered. Further improvements are obtained when multiple input multiple output (MIMO) technique is employed.

Multiple Finger Expansion for Blind Interference Canceller in the Presence of Subchip-Spaced Multipath Components

  • Quek, Tony Q. S.;Suzuki, Hiroshi;Fukawa, Kazuhiko
    • Journal of Communications and Networks
    • /
    • 제6권1호
    • /
    • pp.26-34
    • /
    • 2004
  • A blind interference canceller in the presence of subchipspaced multipath channels for direct-sequence code division multiple access (DS-CDMA) down-link system is considered. This technique is based on combining the existing blind interference canceller with a technique that involves assigning subchip-tap spacing to the Rake receiver. The proposed receiver minimizes the receiver’s output energy subject to a constraint in order to mitigate the multiple access interference (MAI) along each multipath component, and then suboptimally combining all the multipath components. Moreover, it is able to mitigate the mismatch problem when subchip-spaced multipath components arrive at the blind interference canceller. It is known that optimal combining techniques perform a decorrelation operation before combining, which requires both knowledge and computational complexity. In the following, we have adopted a simpler but suboptimum approach in the combining of the suppressed signals at the output of our proposed receiver. Computer simulation results verify the effectiveness of the proposed receiver to handle subchip-spaced multipath components and still suppresses MAI significantly.

A Comparative Study on Interference-Limited Two-Way Transmission Protocols

  • Xia, Xiaochen;Zhang, Dongmei;Xu, Kui;Xu, Youyun
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.351-363
    • /
    • 2016
  • This paper investigates the performance of interference-limited two-way transmission protocols in the Rayleigh fading channels. New lower bound of outage probability and approximate expression of bit error rate (BER) for three-phase two-way relaying (3P-TWR) protocol are derived in closed-form. These expressions are valid for arbitrary signal-to-noise ratio values, numbers of co-channel interferers and amajority of modulation formats employed in the practical system. Then a comparative study is developed for the performance of three two-way transmission protocols, i.e., direct transmission (DT) protocol, two-phase two-way relaying (2P-TWR) protocol and 3P-TWR protocol based on the asymptotic expressions of outage probability and BER. On the basis of the theoretical results, the thresholds on the strength (variance) of direct channel and target rate for the relative performance of different protocols are obtained and the effect of interferences at the terminal and relay on the relative performance is analyzed. The results present key insights on how to choose proper two-way transmission protocol with the knowledge of fading channels, required date rate and modulation format to optimize the system performance in the practical interference-limited scenarios. Simulation results are presented to validate the theoretical analysis.

학습자 개인특성이 6시그마 활용에 미치는 영향과 조직의 학습문화 및 조직지원의 구조적 역할 (The Influence of Learner's Individual Characteristics on Using Six Sigma and the Structural Role of an Organization's Learning Culture and its Support)

  • 최승은;김민선;강소라
    • Journal of Information Technology Applications and Management
    • /
    • 제17권2호
    • /
    • pp.19-45
    • /
    • 2010
  • This research has analyzed the differentiated influence of organizational variables(an organization's learning culture and organizational support networks) and personal variables(the individual's motivation to learn and self-efficacy) on the process of gaining and using of knowledge. These two variables have been regarded as the major variables for the successful learning of 6Sigma, according to Social Cognitive Theory. In addition, this research has proven the role structure of the abovementioned two variables through a suitable methodology(Hierarchical Linear Model). In regard to this methodology, the different hierarchical level of the personal variable and organizational variable was especially focused on, and the effect of interaction between the high level and the low level was considered in detail. Considering the current situation, in that the importance of organizational factor and personal factor has been emphasized but the accurate role of each variable has not been verified, the research model is thought to help to establish an effective strategy to implement 6 Sigma.

  • PDF