• Title/Summary/Keyword: white paper on environment

Search Result 149, Processing Time 0.024 seconds

A Study on CSMA/CA for IEEE 802.11 WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.71-74
    • /
    • 2006
  • A basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size Also, a time of packet transmission delay increases and efficienty is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (A WGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

A Study on CSMA/CA for WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.530-533
    • /
    • 2006
  • Recently, a basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size. Also, a time of packet transmission delay increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

A Case Study on Digital Interactive Training Content <Tamagotchi> and <Peridot>

  • DongHee Choi;Jeanhun Chung
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.306-313
    • /
    • 2023
  • Having pet is one of the activities people living in modern society do to relieve stress and find peace of mind. Currently, the object of companion animals has moved beyond being a real 'living entity' and has developed to a stage where the animal's upbringing process can be enjoyed in a virtual space by being programmed in digital content. This paper studies detailed elements such as character design, interaction, and realism of 'Tamagotchi (1996)', which can be said to be the beginning of digital training content, and 'Peridot (2023)', a recently introduced augmented reality-based training content. The point was that it was training content using portable electronic devices. However, while the environment in the electronic device in which Tamagotchi's character exists was a simple black and white screen, the environment in which Peridot's character operates has been changed to the real world projected on the screen based on augmented reality. Mutual communication with characters in Tamagotchi remained a response to pressing buttons, but in Peridot, it has advanced to the point where you can pet the characters by touching the smartphone screen. In addition, through object and step recognition, it was confirmed that the sense of reality had become more realistic, with toys thrown by users on the screen bouncing off real objects. We hope that this research material will serve as a useful reference for the development of digital training content to be developed in the near future.

Indoor Position Estimation Using Stereo Image Sensor and LEDs (스테레오 이미지 센서와 LED 조명을 이용한 실내 측위)

  • Moon, Myoung-Geun;Choi, Su-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.755-762
    • /
    • 2014
  • In recent year, along with the rapid development of LED technology, many applications using LEDs with Visible Light Communication(VLC) have been researched. Since it is easy to provide LOS communication environment along with cheap deployment cost, the indoor positioning system based on VLC has been actively studied. In this paper, we propose an accurate indoor positioning algorithm using a stereo image sensor and white-light LEDs with the visible light communication. Indoor white-light LEDs are located at the ceiling of a room and broadcast their position information by VLC technology. Mobile receiver with stereo image sensor receives LED position information by VLC and estimates its position and angle information. Simulation results are given to show the efficiency of proposed indoor positioning algorithm.

A Study on Modified Mask for Edge Detection in AWGN Environment (AWGN 환경에서 에지 검출을 위한 변형된 마스크에 관한 연구)

  • Lee, Chang-Young;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2199-2205
    • /
    • 2013
  • In modern society the image processing has been applied to various digital devices such as smartphone, digital camera, and digital TV. In the field of image processing the edge detection is one of the important parts in the image processing procedure. The image edge means point that the pixel value is changed between background and object rapidly, and includes the important information such as magnitude, location, and orientation. The performance of the existing edge detection method is insufficient for the image degraded by AWGN(additive white Gaussian noise) because it detects edges by using small weighted masks. Therefore, in this paper, to detect edge in AWGN environment effectively, we proposed an algorithm that detects edge as calculated gradient of sorting vector which is transformed by estimated mask from new pixel according to each region.

The Signal Detection Algorithms for Reducing False Alarms of CR System in Real Environment (실환경 CR 시스템에서 오경보 감소를 위한 신호 검출 알고리즘)

  • Lim, Sun-Min;Jung, Hoi-Yoon;Kim, Sang-Won;Jeong, Byung-Jang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.529-535
    • /
    • 2011
  • After permission for utilization of TV white space by FCC, a lot of attentions are focused on spectrum sensing, and various spectrum sensing methods have been proposed. However, they do not consider real environment, thus they are hard to achieve the required performance. In this paper, we propose resolutions for the problem which could be occurred in implementation of spectrum sensing module and verify performance of the proposed methods with computer simulation. The first proposed method utilizes channel status information to separate received signal and spurious for reducing false alarm probability caused by system internal spurious. The another proposed scheme is subband normalization method to prevent miss detection caused by multiple narrow band signals with different received signal strength. The simulation results verify that we can prevent false alarm cause by spurious components with the proposed system internal spurious cognition. Moreover, the proposed subband normalization method shows that it could overcome performance degradation caused by received signal strength difference.

A Legal Study on the Environmental Liability of Financial Institutions and its Responses (금융기관의 환경책임과 대응방안에 대한 법적 고찰)

  • Lee, Jae-Hyup
    • Journal of Environmental Policy
    • /
    • v.3 no.1
    • /
    • pp.1-29
    • /
    • 2004
  • The role of the financial institution to promote corporate sustainability may be reviewed in two angles, as a commercial lender and an investor. As a commercial lender, financial institutions should minimize the legal risks and the political risks. Financial institutions began to recognize environmental risks as legal risks that directly affect their lending practices since the legislation of the Comprehensive Environmental Response, Compensation, and Liability Act("Superfund") of the U.S.A. The so-called lender liability rule has a detailed guideline where the financial institutions may be exempted from the Superfund Liability. Similar attempts are noticed in the recent EU White Paper on Environmental Liability. In Korea, comprehensive environmental liability laws are yet to be developed. The Soil Environment Preservation Act now includes a far-reaching environmental liability provisions, where the owners and operators as well as receivers of the facility bear responsibility. However, whether the financial institutions may be captured as a potential responsible party is not very clear. Until the relevant legislation is developed and court decisions accumulate, Korean financial institutions are well advised to raise awareness on this issue, to develop environmental policies and to train personnels.

  • PDF

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

Performance Analysis of Constellation Rearrangement for Retransmission Scheme Based on Chase Combining (체이스 결합기반 재전송에서 성상점 재배치에 따른 성능 분석)

  • Park, Su-Won;Lee, Hyun-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.19-25
    • /
    • 2009
  • In this paper, the constellation rearrangement method for retransmission based on Chase combining, is introduced. And the effectiveness of the recommended constellation rearrangements is analyzed with statistics. Their performance for turbo-coded or convolutional coded bit streams is evaluated with simulation under additive white Gaussian noise environment.

Performance of ACL/SCO Packet Data in Bluetooth Wireless Ad/hoc Network (블루투스 무선 Ad-hoc망에서 ACL/SCO 패킷 데이터의 성능)

  • 김도균;노재성;조성언;조성준
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.29-32
    • /
    • 2001
  • This paper has simulated the PER(Packet Error Rate), ratio of received packet and payload BER of Bluetooth system with packet types of ACL(Asynchronous Connection Less) and SCO(Synchronous Connection Oriented) link over wireless Ad-hoc environment. AWGN(Additive White Gaussian Noise) and Rayleigh fading are considered as channel model, and the analysis is based on the baseband model of Bluetooth system. In terms of PER and ratio of received packet, performance of DM1 packet is almost same as those of HV1, HV2 and HV3 packets, the performances of the other packets depend on the packet types. In terms of payload BER performance, there is no difference among HV2 packet of SCO link and DM1, DM3, DM5 packets of ACL link. Moreover, there is no difference among HV3 packet of SCO link and DM1, DM3, DM5 packets of ACL link, too.

  • PDF