• Title/Summary/Keyword: 공간 네트워크

Search Result 2,151, Processing Time 0.026 seconds

Triangulation Algorithm for Multi-user Spatial Multiplexing in MIMO Downlink Channels (MIMO 다운링크 채널에서 다중사용자 공간다중화를 위한 알고리즘)

  • Lee, Heun-Chul;Paulraj, Aroyaswami;Lee, In-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1C
    • /
    • pp.45-54
    • /
    • 2010
  • This paper studies the design of a multiuser multiple-input multiple-output (MIMO) system, where a base station (BS) transmits independent messages to multiple users. The remarkable "dirty paper coding (DPC)" result was first presented by Costa that the capacity does not change if the Gaussian interference is known at the transmitter noncausally. While several implementable DPC schemes have been proposed recently for single-user dirty-paper channels, DPC is still difficult to implement directly in practical multiuser MIMO channels. In this paper, we propose a network channel matrix triangulation (NMT) algorithm for utilizing interference known at the transmitter. The NMT algorithm decomposes a multiuser MIMO channel into a set of parallel, single-input single-output dirty-paper subchannels and then successively employs the DPC to each subchannel. This approach allows us to extend practical single-user DPC techniques to multiuser MIMO downlink cases. We present the sum rate analysis for the proposed scheme. Simulation results show that the proposed schemes approach the sum rate capacity of the multiuser MIMO downlink at moderate signal-to-noise ratio (SNR) values.

USN Secure Communication Design Using Chaotic System Feedback Synchronization (혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1011-1016
    • /
    • 2018
  • Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

A study on satisfaction and status of use of village unit core facility in Busan - Focusing on project of administrative support type - (부산시 마을단위 거점시설에 대한 이용실태 및 만족도에 관한 연구 - 행정지원형 사업을 중심으로 -)

  • Park, Soung Eun;Lee, Seok-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.399-408
    • /
    • 2016
  • This study conducted an analysis of the current use of and satisfaction with 40 village-unit core facilities that were created through a village-building project in Busan targeting users and non-users of the facilities. The study then examined ideas to promote the availability of the facilities. The results showed that for the users, they had been using the facilities for gathering and information-sharing, and the facilities were improving the interactions among the locals. In terms of non-users, the study confirmed that any relevant fields should develop diverse programs, start promotions in various ways and establish networks among neighbors to increase the non-users' use of the facilities In addition, the study found that the village-unit core facilities are working to encourage interactions among residents and that the locals' voluntary participation in operation of the facilities are needed. The study also suggested that networks across the local communities and diverse programs should be formed and developed.

Design and Evaluation of Fast-Handover Mechanism Between Hetrogeneous Networks Considering the Location Management in PMIPv6 (PMIPv6에서의 위치관리기법을 고려한 이 기종 망간의 Fast Handover 기법 설계 및 평가)

  • Shim, JaeSung;Park, SeokCheon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.219-228
    • /
    • 2012
  • As the wireless Internet become more widely accessible, variety of Internet services can be used without limitation of location. However, existing mobility management methods such as MIP and PMIP of IETF requires the load of heavy protocol stack on the mobile nodes or the addition of components such as LMA and MAG. In this paper, we proposed the location management technique in the PMIPv6 and Fast Handover technique. according to the moving pattern of the node, the location management technique proposed in order to adjust the paging area dynamically. The Fast Handover technique applied MIH technology and it reduced the handover signal processing time between heterogeneous network. The location management cost in the environment which the node moves in order to evaluate this and handover delay time was calculate. The proposal technique was efficiently more evaluated than PMIPv6 with the smallest 29% and maximum 83%.

A Study on Implementation of a VC-Merge Capable High-Speed Switch on MPLS over ATM (ATM기반 MPLS망에서 VC-Merge 가능한 고속 스위치 구현에 관한 연구)

  • Kim, Young-Chul;Lee, Tae-Won;Lee, Dong-Won
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.65-72
    • /
    • 2002
  • In this paper, we implement a high-speed swatch tilth the function for label integration to enhance the expansion of networks using the label space of routers efficiently on MPLS over ATM networks. We propose an appropriate hardware structure to support the VC-merge function and differentiated services simultaneously. In this paper, we use the adaptive congestion control method such as EPD algorithm in carte that there is a possibility of network congestion in output buffers of each core LSR. In addition, we justify the validity of the proposed VC-merge method through simulation and comparison to conventional Non VC-merge methods. The proposed VC-merge capable switch is modeled in VHDL. synthesized, and fabricated using the SAMSUNG 0.5um SOG process.

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

A Study on Tools to Develop Electronic Documents (전자문헌 개발도구에 관한 고찰 - SGML, HTML과 PDF를 중심으로 -)

  • Kim, Yong;NamKoong, Hwang
    • Journal of Information Management
    • /
    • v.29 no.1
    • /
    • pp.1-19
    • /
    • 1998
  • With development in computing and networking technologies, national supports and attention for building digital library, which is to overcome the limits of time and location in using information resources, is increasing. To accomplish the main goal of digital library that is to freely share and transfer information on network, the importance of standardization in developing electronic document is increasing. Now several tools to develop electronic document, which will be used in digital library, are developed for electronic document used on WWW. But none of them has absolute advantages to other formats. Those tools, that is, have comparative advantages and disadvantages for making electronic documents. Through reviewing features and analyzing comparative advantage and disadvantage of SGML, HTML, and PDF, which will be used to develop electronic documents in digital libraries, this study focuses on their comparative advantages and disadvantages. With doing it, this study propose relevant type of electronic document formats to the types of information resources.

  • PDF

A Study on the Improvement and Networking for the Natural leisure areas in Gyeonggi-do (경기도 내 자연 휴식공간의 네트워크화 및 개선방안 연구)

  • Sung, Hyun-Chan;Seo, Jung-Young
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.12 no.3
    • /
    • pp.116-129
    • /
    • 2009
  • This study is to enhance the provincial leisure plans through various programs and infrastructure facilities and to establish a network of natural leisure areas in Gyeonggi-do. According to the result, first, in terms of analyzing the locations of natural leisure areas by types, the rest of urban parks is formed in the Capital area outside Seoul as centering around the central area. Moreover, with regard to the rest of forest and the rest of natural ecology learning, the area of the detention exceeds the total area of Gyeonggi-do. The rest of valleys and swamps showed a dotted pattern of the detention area while the rest of tideland and fishing village experience indicated a distribution of the detention area along the West Coast as an axis. Second, according to result of analyzing the accessibility of natural leisure areas by types, the rest of valleys and swamps showed the highest accessibility among the natural leisure areas : the rest of natural ecology learning had the medium level of accessibility; the rest of forest indicated the lowest accessibility. Therefore, it is necessary to create more leisure areas concerning the futures demands. In addition, they should be constructed in the places adjacent to the urban district area exhibiting higher usability and accessibility. In the places where there are many natural leisure area with higher utility, management plans should be deliberated as well. Based on the result of analyzing the rest of valleys and swamps and the rest of tideland and fishing village experience, it was found that the natural leisure area should improve the quality of water intensively and hydrophile property and create hydrophilic spaces. The development of natural leisure areas need to be carried out under the principle of environmental protection while considering historic sites and nearby rivers and lakes. Moreover, water leisure programs should be developed actively as well with further utilization of water resources in order to enhance the usability of natural leisure.

An analysis of Changes of International Terrorisms of IS (IS테러를 중심으로 한 국제테러의 변화양상 분석)

  • Oh, Seiyouen
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.429-435
    • /
    • 2015
  • This study analyzes the changes of international terrorisms which are caused by IS through literature investigation, statistics and case analysis, and gives an understanding about recent trend of the terrorisms and aggressive method. Moreover, this study is for presenting a basic standard about an effective counterplan of the terrorisms. The results of this study are summarized as follows. First of all, there is a change of terrorism that homegrown terrorism grows into wolf-pack terrorism. Second, the terrorists show psychological terror by expanding their targets and using brutal and indiscriminate terrorism attacks. Third, the terrorists use networks of internet and SNS as a resource and as a tool for publicity activities of their groups. Forth, the terrorists have form of global organization through ties of other terrorists like middle-east or Africa.

Overview and Performance Analysis of the Emerging Scalable Video Coding (스케일러블 비디오 부호화의 개요 및 성능 분석)

  • Choi, Hae-Chul;Lee, Kyung-Il;Kang, Jung-Woo;Bae, Seong-Jun;Yoo, Jeong-Ju
    • Journal of Broadcast Engineering
    • /
    • v.12 no.6
    • /
    • pp.542-554
    • /
    • 2007
  • Seamless streaming of multimedia content via heterogeneous networks to viewers using a variety of devices has been a desire for many multimedia services, for which the multimedia contents should be adapted to usage environments such as network characteristics, terminal capabilities, and user preferences. Scalability in video coding is one of attractive features to meet dynamically changing requirements of heterogeneous networks. Currently a new scalable video coding (SVC) is standardizing in the Joint Video Team (JVT) of the ISO/IEC Moving Picture Experts Group (MPEG) and the ITU-T Video Coding Experts Group (VCEG), which will be released as Extension 3 of H.264/MPEG-4 AVC. In this paper, we introduce new technologies of SVC and evaluate performance of it especially regarding on overhead bit-rate and coding efficiency to support spatial, temporal, and quality scalability.