• Title/Summary/Keyword: 동기 알고리즘

Search Result 990, Processing Time 0.036 seconds

Performance Model and Analysis for Improving Efficient Packet Service of GGSN in CPRS Network (GPRS 망에서 GGSN 노드의 패킷 처리 향상을 위한 성능 모델 및 분석)

  • Kwak, Yong-Won;Min, Jae-Hong;Jeong, Young-Sic;Park, Wung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.826-834
    • /
    • 2002
  • Asynchronous third generation mobile communication system is able to service Packet Switching through adding GPRS Network to the second generation system GSM. Therefore, it is necessary to study packet traffic service of GGSN node which is due to perform gateway role that GPRS Network is enable to inter-connect with Internet in order to optimize the capability and performance of GGSN. In this paper, the Internet packet traffic model that it is arrived to GGSN node from the Internet is studied and In order to process the Inter traffic efficiently, performance analysis model in GGSN is proposed to optimize packet processing capability of each processor. In order to guarantee QoS requirement of the real time traffic Speech and Video, several scheduling algorithm is applied to performance model and each mechanism is compared with several performance parameters.

  • PDF

Analysis of Noise Sensitivity due to Image Wireless Transmission (링크암호 환경에서 이미지 데이터와 잡음의 영향)

  • Kim, KiHwan;Kim, HyeongRag;Lee, HoonJae;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.211-220
    • /
    • 2018
  • The standard data link layer encryption provided by CCSDS has a structure that encodes HDLC frame into it using an AES algorithm. However, CCSDS is standard method has a structure in which the receiving side cannot request a re-activation when noise interference occurs over an unstable channel. SES Alarmed has a structure that enables the receiving side to additionally detect errors and perform re-activation requests in an operational structure similar to that of link encryption in CCSDS. The SES Alarmed related paper was intended to identify the optimum range of thresholds and identify data corruption due to channel noise. In this paper, the focus was on reducing the re-activation process if the HDLC frame, excluding the password Sync code, consistently exceeds any threshold levels. The HDLC frame order was changed and the results of using SES Alarmed were proposed and compared.

A study on systematic review of unplugged activity (언플러그드 활동의 체계적 문헌고찰에 관한 연구)

  • Kim, Jeongrang
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.103-111
    • /
    • 2018
  • In order to examine the educational effects and future directions of unplugged activities, we conducted a systematic review of Korean journals and theses from 2007 to 2016. Three kinds of database were used for systematic review: RISS, KISS, and E-article, and were performed searches using options such as 'unplugged' and 'play-centered'. Based on the protocol selected in the framework of the systematic review, 37 articles were selected analyzed in terms of research status, research subjects, research methods, research hubs, study mechanisms, educational methods, and research effects. Unplugged activities were the most popular among elementary school students. Educational effects were found to have significant effects on academic achievement, problem solving ability, and logical thinking ability. In the affirmative domain, there was a significant effect on interest, curiosity, and motivation. Based on the results of the analysis, the characteristics and implications of Unplugged activities and present the direction of future education were discussed.

DL Radio Transmission Technologies for WRAN Applications : Adaptive Sub-channel Allocation and Stationary Beamforming Algorithms for OFDMA CR System (WRAN 응용을 위한 하향링크 무선전송 방식 : OFDMA 상황인식 시스템에서의 적응 부채널 할당 및 고정 빔 형성 기법)

  • Kim Jung-Ju;Ko Sang-Jun;Chang Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.291-303
    • /
    • 2006
  • In this paper, we analyze functional requirements of the IEEE 802.22 WRAN, and propose a downlink 프레임 structure satisfying the requirements. The proposed downlink 프레임 structure maximizes e transmission efficiency by adopting the cognative radio to assign the sub-channel by reflecting the channel environment of WRAN. We also calculate the signalling overhead for both downlink and uplink, and analyze the performances of time synchronization, frequency synchronization and cell identification based on the 프리앰블 in downlink and suggest the channel estimation method tough 프리앰블 or pilot. As a final result, e stationary beamforming (SBF) algorithm with dynamic channel allocation(DCA) is proposed. The proposed OFDMA downlink 프레임 structure with channel adaptive sub-channel allocation for cognitive radio applications is verified to meet the requirements of IEEE 802.22 WRAN, by computer simulations.

Multi-layer restoration strategy to restore the multi-link and node failures in DCS mesh networks (DCS mesh 네트워크에서 다중 선로 장애와 노드 장애를 복구하기 위한 다중 계층 복구 전략)

  • 김호진;조규섭;이원문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2744-2754
    • /
    • 1997
  • Recently, the Multi-Layer Restoration(MLR) algorithm was proposed by British Telecom(BT) to restore the network failures in Digital Cross-connect System(DCS) mesh survival network[1, 2]. This algorithm has multi restoration stage which is composed of the pre-planned and dynamic restoration. This algorithm is effective its ability in link or node failures. This reason is that it does not restore in the pre-planned rstoration stage but in dynamic restoration stage. In this paper, we propose the MLR with pre-planned Multi-Chooser(PMC) and successive restoration ratio algorithm. This proposed algorithm has a excellent performance for restortion time and ratio, spare channel availability and fast restoration from multiple link failure or node failure. This paper proposed the modeling and restoration algorithm, and analyzed the performance of the algorithm by simulation using OPNET(OPtimized Network Engineering Tools).

  • PDF

Design and Implementation of a smart shoes module based on Arduino (아두이노 기반 스마트 신발 모듈의 설계 및 구현)

  • Seo, Sang-hyun;Jang, Si-woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2697-2702
    • /
    • 2015
  • In the existing studies providing a method which do exercise according to music speed, the method was used which a user changes playing musics. However, if the method which a user changes directly playing musics is used, flow of exercise can be discontinued during searching musics when anyone want to play a fast music. In this paper, we designed the module which measures the number of steps from a user of wearable smart shoes based on the Arduino, and implemented the module so that the number of steps can be measured correctly by sending data to smart phone based on Android. And it is possible to measure moving distance and pace speed by utilizing a GPS in order to get the more accurate momentum. Also, we can measure more accurate calorie consumption than existing products by measuring the mean value of the calorie consumption for moving distance and the calorie consumption for the number of steps, give motivation of exercise by applying an algorithm of changing music genre according to pace speed, and increase the exercise effect at the same time.

Composite Stock Cutting using Distributed Simulated Annealing (분산 시뮬레이티드 어닐링을 이용한 복합 재료 재단)

  • Hong, Chul-Eui
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.1_2
    • /
    • pp.20-29
    • /
    • 2002
  • The composite stock cutting problem is to allocate rectangular and/or irregular patterns onto a large composite stock sheet of finite dimensions in such a way that the resulting scrap will be minimized. In this paper, the distributed simulated annealing with the new cost error tolerant spatial decomposition is applied to the composite stock cutting problem in MPI environments. The cost error tolerant scheme relaxes synchronization and chooses small perturbations on states asynchronously in a dynamically changed stream length to keep the convergence property of the sequential annealing. This paper proposes the efficient data structures for representation of patterns and their affinity relations and also shows how to determine move generations, annealing parameters, and a cost function. The spatial decomposition method is addressed in detail. This paper identifies that the final quality is not degraded with almost linear speedup. Composite stock shapes are not constrained to convex polygons or even regular shapes, but the rotations are only allowed to 2 or 4 due to its composite nature.

Reduction of Presentation Latency in Thin-Client of Cloud System (클라우드 시스템의 씬 클라이언트에서의 표시 지연 절감)

  • Kang, Seung Soo;Ko, Hyun;Yoon, Hee Yong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.163-176
    • /
    • 2013
  • Cloud-based streaming game service has numerous merits, but it may suffer from presentation latency in a thin-client. It is an important issue especially for game service which needs instantaneous response to user inputs. This research proposes the methods for reducing the presentation latency between the server unit and the thin-client unit. The approaches proposed to be employed with server unit include the source/sync video format equalization, encoding format configuration according to the media type, and the S/W implementation for transmitting clock periodically. The methods for the thin-client unit include the decreasing the number of instructions, use of light encryption algorithm, and improvement on H/W decoding. The proposed schemes are tested with a commercialized streaming service platform, which reveals the reduction of presentation latency as large as a few hundred milliseconds and reaches the acceptable level (about 100 milliseconds).

Specification and Synthesis of Speed-independent Circuit using VHDL (VHDL을 이용한 속도 독립 회로의 기술과 합성)

  • Jeong, Seong-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1919-1928
    • /
    • 1999
  • There are no standard language for the specification of speed-independent circuits because existing specification methods are designed appropriately to each synthesis methodology. This paper suggests a method of using VHDL, a standard hardware description language, for the specification and synthesis of speed-independent circuits. Because VHDL is a multi-purpose language, we define a subset of VHDL which can be used for the synthesis. We transform the VHDL description into a signal transition graph and then synthesize speed-independent circuits by using a previous synthesis algorithm which uses a signal transition graph as the specification method. We suggest a systematic transformation method which transforms each VHDL statement into a partial signal transition graph and then merges them into a signal transition graph. This work is a step towards to the development of an integrated framework in which we can utilizes the existing CAD tools based on VHDL. Also, this work will enable a easier migration of the current circuit designers into asynchronous circuit design.

  • PDF

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.