• Title/Summary/Keyword: 다중접속

Search Result 843, Processing Time 0.024 seconds

Performance analysis of multistage interference cancellation schemes for a DS/CDMA system subject to delay constraint (CD/CDMA 시스템에서의 제한된 처리 지연 시간을 고려한 단단계 간섭 제거 방식에 대한 성능 분석)

  • 황선한;강충구
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2653-2663
    • /
    • 1997
  • The successive and parallel interference cancellation schemes are two well-known types of multi-stage interference cancellation schemes using the conventional correlator receivers as a basic building block, which has been known to significantly improve the performance of DS/CDMA system in the multiple access communication. Performance comparison between these two schemes is made strictly based on the analytical and it has been shown that the successive interference cancellation (SIC) scheme is more resistant to fading than the parallel interference cancellation (PIC) scheme. We further investigate the performance of the successive IC scheme subject to the delay constraint, which may be imposed typically on most of service applications with a real-time transmission requirement, including speech and video applications. Our analysis demonstrates that the performance may be significantly improved by the groupwise successive interference cancellation (GSIC) scheme, which can be properly optimized to meet the given delay constraint.

  • PDF

Performance Analysis of Cyclostationary Signal Detection Scheme for LTE System (LTE 시스템을 위한 Cyclostationary 신호 검출 기법의 성능 분석)

  • Kim, Seung Jong;Kim, Kyung Ho;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.28-32
    • /
    • 2014
  • In this paper, we analyzed the performance of cyclostationary signal detection scheme for LTE system. We applied the cyclostationary signal detection scheme to the cognitive radio(CR) technology, which improves the usage efficiency of spectrums and shares frequencies, and we detected the signal in the long term evolution(LTE) band. LTE system has been designated as the standard to improve the maximum data rate and provide the low latency in the 3rd generation partnership project(3GPP). In this paper, we generated the LTE signals based on the orthogonal frequency division multiple access(OFDMA) and analyzed the performance of signal detection in accordance with the segment and threshold of the generated signals. Gaussian channel was used in the simulation and we discussed the future studies to apply the CR to the LTE system.

Design and Implementation of An Automatic Telemetering/Rate Notification System Using CDMA Mobile Communication Modules (CDMA 이동통신모듈을 이용한 원격자동검침 및 요금통보 시스템의 설계 및 구현)

  • Kang, Chang-Soon;Kim, Soo-Jeong;Ko, Eun-Young
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.7
    • /
    • pp.977-985
    • /
    • 2008
  • This paper is concerned with automatic telemetering system which reads the consumed quantity of electricity, gas, and piped water. The existing metering method such that a meterman visits households and directly reads meters can cause several problems, including violation of privacy and the possibility of criminal accident, as well the inefficiency in viewpoint of system operation and rate notification. In this paper, we propose a new automatic telemetering and rate notification system, in which the system reads several meters at remote locations and notifies the rates to the customer's cellular phone with short message service(SMS). The proposed system has been developed by using CDMA mobile communication modules and personal computers. This system can operate only with cellular communication network even without wired-internet facilities. In particular, the developed system can provide home security and convenience as well as cost reduction, and thus be applied to intelligent home networks.

  • PDF

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

Design of the Shortcut based Integrated & Advanced Networking Server(IANS) for QoS path (QoS 경로 설정을 위한 Shortcut 기반 통합 서버 설계)

  • 김기영;이상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.74-84
    • /
    • 2001
  • In the current Internet, InteServ model based on Resource reSerVation Protocol (RSVP), DiffServ Model based on service differentiation according to per hope behavior(PHB) and traffic engineering policy, and two-tire model of above mentioned two models which are adapted differently as the target network status for providing the end-to-end QoS Path are suggested. But, when we integrated this internet QoS into the ATM based network, differences of the connection setup procedure, name/address translation methods, and QoS provisioning mechanisms for end-to-end path setup procedures are introduced. In this paper, we propose the method of shortcut based QoS path setup procedure to solve these problems, and to guarantee the integration and scalability of Next Generation Internet(NGI) names/address in Integrated IP network into ATM based network. This network should support the engineering differentiated into the multiple service classes, which depend on established by this path is designed suitably into the target router and host step by step. In the near future, this function which provide the QoS guaranteed path based on end-to-end shortcut between the configuration devices are extended into the NGI target network.

  • PDF

Efficient Processing of Grouped Aggregation on Non-Uniformed Memory Access Architecture (비균등 메모리 접근 구조에서의 효율적인 그룹화 집단 연산의 처리)

  • Choe, Seongjun;Min, Jun-Ki
    • Database Research
    • /
    • v.34 no.3
    • /
    • pp.14-27
    • /
    • 2018
  • Recently, to alleviate the memory bottleneck problme occurred in Symmetric Multiprocessing (SMP) architecture, Non-Uniform Memory Access (NUMA) architecture was proposed. In addition, since an aggregation operator is an important operator providing properties and summary of data, the efficiency of the aggregation operator is crucial to overall performance of a system. Thus, in this paper, we propose an efficient aggregation processing technique on NUMA architecture. Our proposed technique consists of partition phase and merge phase. In the partition phase, the target relation is partitioned into several partial relations according to grouping attribute. Thus, since each thread can process aggregation operator on partial relation independently, we prevent the remote memory access during the merge phase. Furthermore, at the merge phase, we improve the performance of the aggregation processing by letting each thread compute aggregation with a local hash table as well as avoiding lock contention to merge aggregation results generated by all threads into one.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

A Study on High School Students' Clothing Shopping Orientation and Clothing Purchasing Type in Internet (고등학생의 의복쇼핑성향과 인터넷에서 의류제품 구매유형에 관한 연구)

  • Lee, Eun-Hee
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.1
    • /
    • pp.101-116
    • /
    • 2008
  • Most who were polled stated that they use the internet everyday. Also, it is undeniable that Internet has become one of the popular shopping markets with the spatial-convenience and time-saving it provides. With the growth of Internet and Internet shopping malls, effects on clothing purchasing of adolescents. The purpose of this study was to investigate the clothing shopping orientation and Internet clothing purchasing type of high school students. Subjects were 685(male 354, female 331) high school students located in Jeollabukdo province. In this statistical analysis, SPSS 11.5 for Windows Program. These data were analyzed by factor analysis, $x^2$ test, t-test, One-way Anova, Duncan' multiple range, Pearson's correlation coefficient. The results of this study were as follows. Six dimensions of clothing shopping orientation were derived by factor analysis: fashion hedonic shopping brand ostentation time convenience economic esthetics orientation. The clothing purchasing type in Internet had 3 factors(convenience active impulse buying economic pursuit). The groups were significantly different in regard to clothing shopping orientation, clothing purchasing type in Internet shopping mall according to demographic variables(gender, educational background of parents, a school record). Clothing shopping orientation variables had positive correlations except of hedonic shopping economic orientation with clothing purchasing type in Internet. As a conclusion, high school students' shopping orientation and purchasing type of apparel in Internet shopping mall constituted important characteristics which could affect directly Internet purchase behavior of adolescents. These results should be fundamental information for clothing and textile education in secondary school.

  • PDF