• Title/Summary/Keyword: 전송 용량

Search Result 871, Processing Time 0.036 seconds

The Method of Localization using Radical Line among Sensor Nodes under the Internet Of Things (사물 인터넷 환경에서 Radical Line을 이용한 센서 노드간의 지역화방법)

  • Shin, Bong-Hi;Jeon, Hye-Kyoung
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.207-212
    • /
    • 2015
  • The sensor network that is component of the Internet of Things require a lot of research to select the best route to send information to the anchor node, to collect a number of environment and cost efficient for communication between the sensor life. On the sensor network in one of the components of IOT's environment, sensor nodes are an extension device with low power low capacity. For routing method for data transmission between the sensor nodes, the connection between the anchor and the node must be accurate with in adjacent areas relatively. Localization CA (Centroid Algorithm) is often used although an error frequently occurs. In this paper, we propose a range-free localization method between sensor nodes based on the Radical Line in order to solve this problem.

Document Replacement Policy by Web Site Popularity (웹 사이트의 인기도에 의한 도큐먼트 교체정책)

  • Yoo, Hang-Suk;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.227-232
    • /
    • 2008
  • General web caches save documents temporarily into themselves on the basis of those documents. And when a corresponding document exists within the cache on user's request. web cache sends the document to corresponding user. On the contrary. when there is not any document within the cache, web cache requests a new document to the related server to copy the document into the cache and then turn it back to user. Here, web cache uses a replacement policy to change existing document into a new one due to exceeded capacity of cache. Typical replacement policy includes document-based LRU or LFU technique and other various replacement policies are used to replace the documents within cache effectively. However. these replacement policies function only with regard to the time and frequency of document request. not considering the popularity of each web site. Based on replacement policies with regard to documents on frequent requests and the popularity of each web site, this paper aims to present the document replacement policies with regard to the popularity of each web site, which are suitable for latest network environments to enhance the hit-ratio of cache and efficiently manage the contents of cache by effectively replacing documents on intermittent requests by new ones.

  • PDF

Principal Component Transformation of the Satellite Image Data and Principal-Components-Based Image Classification (위성 영상데이터의 주성분변환 및 주성분 기반 영상분류)

  • Seo, Yong-Su
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.4
    • /
    • pp.24-33
    • /
    • 2004
  • Advances in remote sensing technologies are resulting in the rapid increase of the number of spectral channels, and thus, growing data volumes. This creates a need for developing faster techniques for processing such data. One application in which such fast processing is needed is the dimension reduction of the multispectral data. Principal component transformation is perhaps the mostpopular dimension reduction technique for multispectral data. In this paper, we discussed the processing procedures of principal component transformation. And we presented and discussed the results of the principal component transformation of the multispectral data. Moreover principal components image data are classified by the Maximum Likelihood method and Multilayer Perceptron method. In addition, the performances of two classification methods and data reduction effects are evaluated and analyzed based on the experimental results.

  • PDF

Subcarrier-based Handover Scheme for Downlink OFDMA Cellular systems (하향링크 직교주파수분할다중접속 셀룰러 시스템을 위한 부반송파 기반 핸드오버 기법)

  • Wang, Han-O;Lee, Sung-Eun;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.2
    • /
    • pp.60-66
    • /
    • 2008
  • In this paper, a new subcarrier-based handover scheme which exploits different channel gains of subcarriers in downlink OFDMA cellular systems. In this handover scheme, mobile users can obtain diversity gain by subcarrier selection. Feedback for unselected subcarriers reduces interference. The capacity enhancement by the handover scheme is originated from the following two characteristics of OFDMA systems. One is that interference per subcarrier is proportional to the traffic load. The other is that every subcarrier has different channel gain ?? 새 the Rayleigh fading channel. Therefore, selecting subcarriers with stronger channel gains results in diversity gain. Simulation results confirm that the proposed handover scheme improves the capacity of the OFDMA systems by reducing 24 percentage of the outage probability.

A Study on the Design of the Directional Coupler using Three Layer Microstrip Substrate (세 층 마이크로스트립 유전체 기판을 이용한 방향성 결합기 설계에 관한 연구)

  • 천동완;김원기;박정훈;김상태;신철재
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.4
    • /
    • pp.513-520
    • /
    • 2001
  • In this paper, the directional coupler using three layer microstrip substrate is proposed and the design method is notified. Modified re-entrant mode coupler is the proposed structure that one layer is added on upper plane of coupled transmission lines and the floating conductor is placed on added layer's upper planes. This structure has high coupling for the increase of odd mode capacitance and also has good performance in VSWR, isolation, phase difference because the difference of effective permittivity is small in each mode. We have designed the coupler from the calculation of impedance, effective permittivity, coupling coefficient using even, odd mode analysis method. From the simulation and measurement, proposed coupler has about 2 dB more tighter coupling than conventional coupler and also has good performance in VSWR, isolation, phase difference.

  • PDF

Energy Efficient Two-Tier Routing Protocol for Wireless Sensor Networks (센서 네트워크에서 에너지 효율성을 고려한 two-tier 라우팅 프로토콜)

  • Ahn Eun-Chul;Lee Sung-Hyup;Cho You-Ze
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.103-112
    • /
    • 2006
  • Since sensor node has a limited energy supply in a wireless sensor network, it is very important to maximize the network lifetime through energy-efficient routing. Thus, many routing protocols have been developed for wireless sensor networks and can be classified into flat and hierarchical routing protocols. Recent researches focus on hierarchical routing scheme and LEACH is a representative hierarchical routing protocol. In this paper, we investigated the problems of the LEACH and proposed a novel energy efficient routing scheme, called ENTER(ENergy efficient Two-tiEr Routing protocol), to resolve the problem. ENTER reduces an energy consumption and increases a network lifetime by organizing clusters by the same distributed algerian as in the LEACH and establishing paths among cluster-heads to transmit the aggregated data to the sink node. We compared the performance of the ENTER with the LEACH through simulation and showed that the ENTER could enhance the network lifetime by utilizing the resources more efficiently.

Performance Evaluation of Channel Estimation and Interference Cancellation Techniques for Multiuser with Transmitter Diversity System (송신 다이버시티를 가진 다중 사용자 시스템에서 채널 추정 및 간섭 제거 기법들의 성능 평가)

  • 유형준;이상문;최형진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7A
    • /
    • pp.641-650
    • /
    • 2002
  • Space-Time Block Code(STBC) provides full diversity gains with simple linear processing at the receiver. Interference Cancellation(IC) techniques in system using STBC improve the capacity and performance of wireless systems with co-channel users. Various IC techniques, Minimum Mean-Squared Error(MMSE) and Zero-Forcing(ZF) algorithms in system with STBC were proposed in the literatures in multiuser environment. The performance of these IC techniques were simulated by assuming perfect channel state information(CSI) of multiuser at the receiver. However, in practice it is difficult to know perfect CSI of multiuser at the receiver. Thus, channel estimation scheme is essential at the receiver. Also SNR estimation scheme is required to operate the MMSE IC algorithm. In this paper, we present estimation schemes of CSI and SNR using training sequences. Through extensive computer simulation, we compare and evaluate the performance of IC techniques using the proposed CSI and SNR estimation techniques.

A Channel Estimation Method for Multipath Feedback Interference Signal Cancellation of RF Repeaters (RF 중계기의 다중 궤환 간섭 신호 제거를 위한 채널 추정 방식)

  • Lee, Sang-Dae;Park, Jin;Sung, Won-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.98-106
    • /
    • 2008
  • To reduce the outage probability and to increase the transmission capacity, the importance of repeaters in cellular systems keeps increasing. Unlike optical repeaters which require wireline connections, RF repeaters are easy to install, have low limitations in location and also have a reduced operational expense such as the optical fiber maintenance cost. On the other hand, RF repeaters suffer the interference due to the feedback signals between the transmitter and receiver antennas, hence require an extra interference cancellation method when the amount of the feedback signal reduction by using the shielding is not sufficient. In this paper, a channel estimation method for two-path feedback interference signals in the ICS (Interference Cancellation System) repeaters using baseband signal processing is proposed and its performance is evaluated. When compared with the conventional method which estimates each multipath individually, the proposed method achieves 10 dB performance gain in terms of the normalized mean-squared-error.

Performance Comparison of Space-Time Block Coding in High-speed Railway Channel (고속 철도 채널 환경에서 시공간 블록 부호 성능 비교)

  • Park, Seong-Guen;Lee, Jong-Woo;Jeon, Taehyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.291-297
    • /
    • 2014
  • Due to the rapid increase in demand for transportation of human and freight in modern railway systems, the CBTC system has been proposed, which is the solution for improvement of the line capacity that has been limited by the conventional track circuit based train control system. In the CBTC system, higher reliability of the communication system should be guaranteed for the safety of passengers and trains. However, due to the inherent characteristics of the wireless channel environment, performance degradations are inevitable. The diversity techniques can increase the reliability of data transmission using multiple antennas. In this paper, we investigate the performance of the STBC in the railway channel environment. Rician fading model is used for the viaduct scenarios which take important roles in the railway system. Also, considered is the Doppler effect which is an important factor in the mobile communication system. Simulations are performed to analyze the performance of the STBC in various channel environments. Results show that the performance degradation due to the phase error in viaduct scenarios is independent of the diversity order but is affected by the constellation of the modulation.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.