• Title/Summary/Keyword: 코드 분할

Search Result 380, Processing Time 0.027 seconds

Codebook Design and Centralized Scheduling for Joint Transmission SDMA with Limited Feedback (제한된 피드백을 사용하는 결합 전송 공간 분할 다중 접속 기술을 위한 코드북 설계와 집중 스케줄링)

  • Mun, Cheol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.10
    • /
    • pp.1180-1187
    • /
    • 2012
  • In this paper, joint transmission space division multiple access(JT-SDMA) scheme is proposed to mitigate inter-cell interference(ICI) in cooperative wireless communications system with limited feedback. We propose a systematic design method for a codebook consisting of a finite number of unitary matrices suitable for network multiple-input multiple-output( MIMO) channel characteristics. A centralized cluster scheduling scheme is proposed to both mitigate ICI and maximizes multiuser diversity gain with limited feedback. It is shown that the proposed JT-SDMA scheme outperforms a existing coordinated SDMA scheme even in wireless network environments where sufficient multiuser diversity order can not be provided through efficient ICI mitigation.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

해외정보

  • Korea Packaging Association INC.
    • The monthly packaging world
    • /
    • s.152
    • /
    • pp.176-181
    • /
    • 2005
  • 日, 석유 화학업계 합성수지 수출 급락/ 美, 군수물자 관리 RFID도입 본격화/ 오만, 플라스틱 산업 황금기 예상/ 日, 제지업계 불황지속/ 리비아, 플라스틱산업 적극 육성/ 美, Amcor 미생물 분해 병 생산 투자/ 중국산 식품용기 발암물질 방출/ 獨R, FID 상품코드(EPC) 라벨시장 급부상

  • PDF

Fountain Code-based Hybrid P2P Storage Cloud (파운틴 코드 기반의 하이브리드 P2P 스토리지 클라우드)

  • Park, Gi Seok;Song, Hwangjun
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.58-63
    • /
    • 2015
  • In this work, we present a novel fountain code-based hybrid P2P storage system that combines cloud storage with P2P storage. The proposed hybrid storage system minimizes data transmission time while guaranteeing high data retrieval and data privacy. In order to guarantee data privacy and storage efficiency, the user transmits encoded data after performing fountain code-based encoding. Also, the proposed algorithm guarantees the user's data retrieval by storing the data while considering each peer's survival probability. The simulation results show that the proposed algorithm enables fast completion of the upload transmission while satisfying the required data retrieval and supporting the privacy of user data under the system parameters.

Establishment Threshold Value of Image Realization & Reconstruction of Stoppage Image using Picture Resemblance (닮은꼴을 이용한 영상구현 임계값설정과 정지영상 복원법)

  • Jin, Hyun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.187-194
    • /
    • 2011
  • In this paper, JPEG(Joint Photographic Experts Group) image data video decoding technique is presented, it is Huffman decoding method and fractal image method which is very complexive algorithm and the time required much it to implement this method and the first image is decoded to video frame image. This have defect of overlap decoding and transport work because of impossible to represent objective value of resemblance. The proposed method was calculated the mathematical absolute image resemblance and simplify the moving picture process to reducing the step of moving picture codefying. The results show that smoothed moving picture compared recent methods.

New Moving Picture Decoding Process using Picture Resemblance (닮은꼴을 이용한 새로운 동영상 디코딩 처리방법)

  • Soo, Jin-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.873-879
    • /
    • 2010
  • In this paper, MPEG2(Moving Picture Expert Group 2) image data video decoding technique is presented, it is Huffman decoding method and fractal image method which is very complexive algorithm and have too much times to implement this method. This have defect of overlap decoding and transport work because of impossible to represent objective value of resemblance. The proposed method was calculated the mathematical absolute image resemblance and simplify the moving picture process to reducing the step of moving picture codefying. The results show that smoothed moving picture compared recent methods.

Design of Alert Message and Message Segmentation For T-DMB Automatic Emergency Alert Service Standard (지상파 DMB 자동 재난경보방송 표준을 위한 재난 메시지 및 메시지 분할 방법 설계)

  • Choi, Seong-Jong
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.304-312
    • /
    • 2010
  • This paper presents the design of alert message and message segmentation method for the Terrestrial DMB Automatic Emergency Alert Service Standard. This paper begins with the introduction of the standard and some background. The alert message contains the essential information of the alert. Structured information is represented as coded fields and the unstructured as short sentences. Design factors of each field are analyzed first. Next each field’s semantics and syntax are described. The message segmentation method is presented next. The previous study selected FIDC as the message delivery channel. However, in most cases, the size of the alert message exceeds the maximum size of FIG, which is the basic unit packet for the channel. The current T-DMB standard does not support the segmentation method for FIDC. To solve the problem, this paper proposes an elegant segmentation method that garantees reliable, flexible, and fast receiver characteristic. This paper concludes with some additional tasks that should be resolved before the full-time alert service.