• Title/Summary/Keyword: total software

Search Result 1,530, Processing Time 0.165 seconds

Performance Analysis on Intelligent Reflecting Surface Transmission for NOMA Towards 6G Systems

  • Chung, Kyuhyuk
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.220-224
    • /
    • 2022
  • The efficiencies of rates and energy in the fifth generation (5G) wireless channels can be improved via intelligent reflecting surface (IRS) transmissions, towards the sixth generation (6G) mobile communications. While previous works have considered mainly optimizations of IRS transmissions, we propose a performance analysis on the total power in terms of the number of reflecting devices for IRS transmissions in non-orthogonal multiple access (NOMA) networks. First, we derive an analytical expression of the total power gain factor in terms of the number of reflecting devices for the cell-edge user in IRS-NOMA systems. Then we evaluate how many reflecting devices we need to obtain a total power gain in dB. Moreover, we also demonstrate numerically the signal-to-noise ratio (SNR) gain of the IRS-NOMA system over the conventional NOMA system based on the achievable data rate.

Effect of repeated learning for two dental CAD software programs (두 종의 치과용 캐드 소프트웨어에 대한 반복학습의 효과)

  • Son, KeunBaDa;Lee, Wan-Sun;Lee, Kyu-Bok
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.33 no.2
    • /
    • pp.88-96
    • /
    • 2017
  • Purpose: The purpose of this study is to assess the relationship between the time spent designing custom abutments and repeated learning using dental implant computer aided design (CAD) software. Materials and Methods: The design of customized abutments was performed four stages using the 3DS CAD software and the EXO CAD software, and measured repeatedly three times by each stage. Learning effect by repetition was presented with the learning curve, and the significance of the reduction in the total time and the time at each stage spent on designing was evaluated using the Friedman test and the Wilcoxon signed rank test. The difference in the design time between groups was analyzed using the repeated measure two-way ANOVA. Statistical analysis was performed using the SPSS statistics software (P < 0.05). Results: Repeated learning of the customized abutment design displayed a significant difference according to the number of repetition and the stage (P < 0.001). The difference in the time spent designing was found to be significant (P < 0.001), and that between the CAD software programs was also significant (P = 0.006). Conclusion: Repeated learning of CAD software shortened the time spent designing. While less design time on average was spent with the 3DS CAD than with the EXO CAD, the EXO CAD showed better results in terms of learning rate according to learning effect.

Students' attitudes toward learning proofs and learning proofs with GSP (증명학습에 대한 학생들의 성향과 GSP를 활용한 증명학습)

  • Han, Hye-Suk;Shin, Hyun-Sung
    • Journal of the Korean School Mathematics Society
    • /
    • v.11 no.2
    • /
    • pp.299-314
    • /
    • 2008
  • The purposes of this study were to investigate what attitudes students have toward learning proofs and what difficulties they have in learning proofs, and to examine how the use of dynamic geometry software, the Geometer's Sketchpad, helps students' proof learning. The study involved 117 9th graders in 2 high schools. According to questionnaire data, over 50 percent of the total respondents(116) indicated negative attitudes toward learning proofs, on the other hand, only 16 percent of the total respondents indicated positive attitudes toward the learning. Memorizing and remembering many kinds of theorems, definitions, and postulates to use in proving statements was the most difficult part in learning proofs, which the largest proportion of the total respondents indicated. The study found that the use of the Geometer's Sketchpad played positive roles in developing students' understanding of proofs and stimulating students' interests in learning proofs.

  • PDF

Quality Assessment of Beef Using Computer Vision Technology

  • Rahman, Md. Faizur;Iqbal, Abdullah;Hashem, Md. Abul;Adedeji, Akinbode A.
    • Food Science of Animal Resources
    • /
    • v.40 no.6
    • /
    • pp.896-907
    • /
    • 2020
  • Imaging technique or computer vision (CV) technology has received huge attention as a rapid and non-destructive technique throughout the world for measuring quality attributes of agricultural products including meat and meat products. This study was conducted to test the ability of CV technology to predict the quality attributes of beef. Images were captured from longissimus dorsi muscle in beef at 24 h post-mortem. Traits evaluated were color value (L*, a*, b*), pH, drip loss, cooking loss, dry matter, moisture, crude protein, fat, ash, thiobarbituric acid reactive substance (TBARS), peroxide value (POV), free fatty acid (FFA), total coliform count (TCC), total viable count (TVC) and total yeast-mould count (TYMC). Images were analyzed using the Matlab software (R2015a). Different reference values were determined by physicochemical, proximate, biochemical and microbiological test. All determination were done in triplicate and the mean value was reported. Data analysis was carried out using the programme Statgraphics Centurion XVI. Calibration and validation model were fitted using the software Unscrambler X version 9.7. A higher correlation found in a* (r=0.65) and moisture (r=0.56) with 'a*' value obtained from image analysis and the highest calibration and prediction accuracy was found in lightness (r2c=0.73, r2p=0.69) in beef. Results of this work show that CV technology may be a useful tool for predicting meat quality traits in the laboratory and meat processing industries.

Improved Function Point Model for Software Size Estmation (소프트웨어 규모예측을 위한 기능점수모형의 개선)

  • An, Yeon-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.993-1003
    • /
    • 1997
  • In this paper an improvement is made on the function point moedl,one of sortware size dstimation model,for better fesibility with increased accuracy as my proposed moedl.For better feasibility seven function typcs are proposed in this model and technical complexity factors are used to assecss the diffculties of considering technical and distributed enviroment attributes.To assess the creditability of the proposed model,24-software develop-ment cases were cinsidered in the regression model with the actual require efforts as the total function points. As seen in the statistical results,the proposed model is at least as superior to the known function point models.

  • PDF

The study on SLA system architecture for IP TV (IP TV를 위한 SLA 시스템 구조에 관한 연구)

  • Kim, Seong-Hwan;Lee, Gil-Haeng
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.47-52
    • /
    • 2005
  • In this paper we describe SLA metrics and software architecture for newly upcoming IP TV service. Firstly we show the general description for IP TV. This consists of brief description of IP TV, the general figure of configuration and elements of IP TV network and communication protocol stack of IP TV data transmission for deriving communication quality parameter. And we propose SLA metrics depending on quality measurement point. According to the measurement point the measurable SLA metrics are different. The total view of the IP TV SLA measurement and management architecture is shown. When the quality measurement point is the routers that consist of internet node, the IP media NMS is the quality collection system. And when the quality measurement point is the IP TV STB(Set-Top Box), the IP media collector and Quality Collection Server are the quality collection system. And we show the software block diagram of IP TV SLA processing system and the other related network management systems.

  • PDF

Performance Evaluation of a Method to Improve Fairness in In-Vehicle Non-Destructive Arbitration Using ID Rotation

  • Park, Pusik;Igorevich, Rustam Rakhimov;Yoon, Jongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5098-5115
    • /
    • 2017
  • A number of automotive electronics-safety, driver assistance, and infotainment devices-have been deployed in recent vehicles. This raises new challenges regarding in-vehicular network arbitration. A performance analysis of non-destructive arbitration has revealed a fairness issue. The arbitration prioritizes without collisions, despite multiple simultaneous transmissions; however, the performances of the highest priority node and the lowest priority node are very different. In this paper, an ID-rotation arbitration method to solve the arbitration-fairness problem is proposed. The proposed algorithm was applied to several engine control units (ECUs), including a controller area network (CAN) controller. Experimental results showed that the algorithm improved the fairness as well as the total throughput within a specific performance constraint.

Formal Trust Assessment with Confidence Probability

  • Kutay, Mahir;Ercan, Tuncay
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.830-842
    • /
    • 2015
  • Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence probability. This will give us a more realistic approach to the trust assessments between individuals and organizations. We also developed a web-based software tool, TAST (Trust Assessment Software Tool) that collects the web services' evaluation of different customer groups for similar organizations through the user interface and calculates the trust intervals for predefined and previously selected confidence values. Our model uses a weighted calculation of mean and variances of customer groups in specific periods and analyses the total and incremental trust of different customer groups.

Proteomic Approach Analysis of Mammary Membrane Proteins Expression Profiles in Holstein Cows

  • Yang, Yong-xin;Cao, Sui-zhong;Zhang, Yong;Zhao, Xing-xu
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.22 no.6
    • /
    • pp.885-892
    • /
    • 2009
  • To investigate host defense mechanisms for protecting the mammary gland from mastitis infection, the membrane fraction of mammary tissues from Holstein cows was purified by differential velocity centrifugation, and then the sodium dodecyl sulfate-polyacrylamid gel electrophoresis (SDS-PAGE) separated proteins were identified by ion trap mass spectrometer equipped with a Surveyor high performance liquid chromatography (HPLC) system. A total of 183 proteins were identified. Bioinformatics software was applied to analyse physicochemical characteristics of the identified proteins and to predict biochemical function. These data may provide valuable information to investigate the mechanisms of mammary gland milk secretion and infectious disease, and enable a clear identification of proteins and potential protein targets for therapies.

Hardware Design of 352-bit Cipher Algorithm (352-비트 암호 알고리즘의 하드웨어 설계)

  • Park, Young Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.51-61
    • /
    • 2009
  • Conventional DES has been not only shown to have a vulnerable drawback to attack method called 'Meet in the Middle', but also to be hard to use that it is because software implementation has a number of problem in real time processing. This paper describes the design and implementation of the expanded DES algorithm using VHDL for resolving the above problems. The main reason for hardware design of an encryption algorithm is to ensure a security against cryptographic attack because there is no physical protection for the algorithm written in software. Total key length of 352 bits is used for the proposed DES. The result of simulation shows that the inputted plaintext in cryptosystem are equal to the outputted that in decryptosystem.