• Title/Summary/Keyword: the Information Poor

Search Result 1,963, Processing Time 0.037 seconds

A Study on the X-Band Active Radar Reflector for safety at the Sea (해상 안전을 위한 X밴드 능동형 레이더 반사기에 관한 연구)

  • 정종혁;김남호;양규식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.849-858
    • /
    • 1999
  • There are several improved designs of passive radar reflector available, but their performance is ultimately limited by the cross-section area and this is governed by the size of the buoy and the acceptable windage. Therefore it is needed to investigate the low-cost, low power, a active device that can be improve the reliability of response. Active Radar Reflector(AAR) consists of a microwave amplifier with separate receive and transmit antennas. It is a device which automatically transmits a signal in response to an interrogating signal received. It was intended to improve the consistency of the radar return from the buoy and the small craft, particularly in poor sea conditions. And it directly improves safety of navigation at sea.

  • PDF

A Measurement System for 3D Hand-Drawn Gesture with a PHANToMTM Device

  • Ko, Seong-Young;Bang, Won-Chul;Kim, Sang-Youn
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.347-358
    • /
    • 2010
  • This paper presents a measurement system for 3D hand-drawn gesture motion. Many pen-type input devices with Inertial Measurement Units (IMU) have been developed to estimate 3D hand-drawn gesture using the measured acceleration and/or the angular velocity of the device. The crucial procedure in developing these devices is to measure and to analyze their motion or trajectory. In order to verify the trajectory estimated by an IMU-based input device, it is necessary to compare the estimated trajectory to the real trajectory. For measuring the real trajectory of the pen-type device, a PHANToMTM haptic device is utilized because it allows us to measure the 3D motion of the object in real-time. Even though the PHANToMTM measures the position of the hand gesture well, poor initialization may produce a large amount of error. Therefore, this paper proposes a calibration method which can minimize measurement errors.

A Competition-based Algorithm for Routing Discovery and Repair in Large-scale VANET

  • Wu, Cheng;Wang, Lujie;Wang, Yiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5729-5744
    • /
    • 2017
  • Vehicular Ad Hoc Networks (VANET) in the large-scale road section usually have typical characteristics of large number of vehicles and unevenly distribution over geographic spaces. These two inherent characteristics lead to the unsatisfactory performance of VANETs. This poor performance is mainly due to fragile communication link and low dissemination efficiency. We propose a novel routing mechanism to address the issue in the paper, which includes a competition-based routing discovery with priority metrics and a local routing repair strategy. In the routing discovery stage, the algorithm uses adaptive scheme to select a stable route by the priorities of routing metrics, which are the length of each hop, as well as the residual lifetime of each link. Comparisons of different ratios over link length and link stability further show outstanding improvements. In the routing repair process, upstream and downstream nodes also compete for the right to establish repair process and to remain as a member of the active route after repair. Our simulation results confirm the improved performance of the proposed algorithm.

Comparison of Outage Probability Between Best-relay 2-hop Relaying and 3-hop Relaying (두 릴레이가 존재할 때 삼중 홉 중계와 베스트 릴레이 선택 후 이중 홉 중계 방식의 아웃티지 확률 비교)

  • Youn, You-Sun;Kim, Dong-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.136-143
    • /
    • 2010
  • In this paper, we investigate decode-and-forward (DF) relaying systems with a direct link between the source and the destination node. The objective of this paper is to determine the better relaying strategy between 3-hop DF relaying and dual-hop DF relaying with the best relay selection. Assuming Rayleigh fading channels, we present closed-form outage probability of the 3-hop relaying and the dual-hop relaying, respectively, and compare the performances by numerical investigation. Numerical results show that if the channel is poor, the outage performance of the 3-hop relaying is better than the dual-hop relaying.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Performance Evaluation of Hash Join Algorithms Supporting Dynamic Load Balancing for a Database Sharing System (데이타베이스 공유 시스템에서 동적 부하분산을 지원하는 해쉬 조인 알고리즘들의 성능 평가)

  • Moon, Ae-Kyung;Cho, Haeng-Rae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3456-3468
    • /
    • 1999
  • Most of previous parallel join algorithms assume a database partition system(DPS), where each database partition is owned by a single processing node. While the DPS is novel in the sense that it can interconnect a large number of nodes and support a geographically distributed environment, it may suffer from poor facility for load balancing and system availability compared to the database sharing system(DSS). In this paper, we propose a dynamic load balancing strategy by exploiting the characteristics of the DSS, and then extend the conventional hash join algorithms to the DSS by using the dynamic load balancing strategy. With simulation studies under a wide variety of system configurations and database workloads, we analyze the effects of the dynamic load balancing strategy and differences in the performances of hash join algorithms in the DSS.

  • PDF

Influences of Power Fluctuation on In-Situ Ground Thermal Response Testing (지중 열반응 현장시험에서 소비전력 변동의 영향)

  • Kim, Jin-Sang;Park, Keun-Woo
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.707-712
    • /
    • 2006
  • Knowing the ground thermal conductivity is very importnat in designing ground heat exchangers. Knowledge of the ground soil and rock composition information dose not guarantee the prediction of accurate thermal information. In Situ testing of ground heat exchangers is becoming popular. However, in situ testing are performed at construction sites in real life. Adequate data collection and analysis are not easy mainly due to poor power quality. Power fluctuation also causes the fluctuation of received data. The power quality must be maintained during the entire in situ testing processes. To accurately analyse the test data, the understanding of the response of the power fluctuation is essential. Testing under the power quality varied by tester is very difficult. Analyzing power variation by numerical simulation is a realistic option. By varying power in a sinosuidal manner, its effects on predicting thermal conductivity from thermal response plots made from the test data are examined.

  • PDF

Performance Evaluation of Lower Complexity Hybrid-Fix-and-Round-LLL Algorithm for MIMO System

  • Lv, Huazhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2554-2580
    • /
    • 2018
  • Lenstra-Lenstra-$Lov{\acute{a}}sz$ (LLL) is an effective receiving algorithm for Multiple-Input-Multiple-Output (MIMO) systems, which is believed can achieve full diversity in MIMO detection of fading channels. However, the LLL algorithm features polynomial complexity and shows poor performance in terms of convergence. The reduction of algorithmic complexity and the acceleration of convergence are key problems in optimizing the LLL algorithm. In this paper, a variant of the LLL algorithm, the Hybrid-Fix-and-Round LLL algorithm, which combines both fix and round measurements in the size reduction procedure, is proposed. By utilizing fix operation, the algorithmic procedure is altered and the size reduction procedure is skipped by the hybrid algorithm with significantly higher probability. As a consequence, the simulation results reveal that the Hybrid-Fix-and-Round-LLL algorithm carries a faster rate of convergence compared to the original LLL algorithm, and its algorithmic complexity is at most one order lower than original LLL algorithm in real field. Comparing to other families of LLL algorithm, Hybrid-Fix-and-Round-LLL algorithm can make a better compromise in performance and algorithmic complexity.

An Analysis on the degree of Utilization of Korean Menu Items in Family Restaurants - With Special Reference to Consumer Satisfaction - (패밀리레스토랑의 한식메뉴 이용실태 및 이용고객의 만족도 분석)

  • Park, Seung-Ae
    • Journal of the Korean Society of Food Culture
    • /
    • v.12 no.1
    • /
    • pp.23-33
    • /
    • 1997
  • The aim of this study has been two fold - to analyze the degree of utilization of Korean menu items in family restaurants; and to evaluate consumer satisfaction with the quality of family restaurant food and food-related service. A self-completed questionnaire survey of 280 consumers having meals in 6 family restaurants in Korea was undertaken and detailed information was collected from each. Consumer satisfaction with the quality of food and food-related service in family restaurants was evaluated by consumer questionnaires. It was measured by assessing 24 variables. Statistical data analysis was using SAS package program for descriptive analysis, t-test and analysis of variance. Importance mean score of customers was 4.07 out of 5, with performance mean score of 3.19. The gap between importance and performance scores was 0.87. The Importance-Performance Analysis (IPA) technique was used for obtaining information of the degree of utilization of Korean menu items in family restaurants. By the results of the IPA technique, menu items with fair to poor performance and high importance to the customer were cooked meals, noodles, steamed and grilled dishes, Korean salads, kimchi, beverages, single-dish course, suggesting that customer seemed to be dissatisfied with the degree of utilization of Korean menu items in family restaurants.

  • PDF

Gait Training Strategy by CPG in PNF with Brain Injured Patients (고유수용성 신경촉진법에서 CPG를 이용한 뇌손상자 보행훈련전략)

  • Bae Sung-soo
    • The Journal of Korean Physical Therapy
    • /
    • v.17 no.1
    • /
    • pp.108-122
    • /
    • 2005
  • The gait training strategy in very important things for central nervous system(CNS) injury patients. There are many method and strategy for regaining of the gait who had CNS injury. A human being has central pattern generator(CPG) is spinal CPG for locomotion. It is a neural network which make the cyclical patterns and rhythmical activities for walking. Sensory input from loading and hip position is essential for CPG stimulation that makes the central neural rhythm and pattern generating structure. From sensory input, the proprioceptive information facilitate proximal muscles that controlled in voluntarily from cortical level and visual and / or acoustical information facilitate distal muscles that controlled voluntarily from subcortical level. Gait training method can classify that is functional level and structural level. Functional level includ level surface gait, going up and down the stair. It is important to facilitate a guide tempo in order to activate the central pattern generators. During the functional test or functional activities, can point out the poor period in gait that have to be facilitate in structural level. There are many access methods with patient position and potentiality. The methods are using of rhythmic initiation, replication and combination of isotonic with standing position. Clinically using it on weight transfer onto the stance leg, loading response, loading response and pre-swing, terminal stance, up and downwards stairs.

  • PDF