• Title/Summary/Keyword: 2-mode 네트워크

Search Result 147, Processing Time 0.021 seconds

A Study on the Optimal Wireless Resource Allocation for the Access and Relay Zones of Downlink in a 2-hop Cellular Relay System based on IEEE802.16j (IEEE802.16j 기반의 2-홉 셀룰러 중계시스템에서 하향링크 접근영역과 중계영역에 대한 최적 무선자원 할당방법 연구)

  • Lee, In-Hwan;Kim, Se-Jin;Cho, Sung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.43-51
    • /
    • 2010
  • In this paper, we evaluate the system throughput and the method of optimal wireless resource allocation for the access zone (AZ) and relay zone (RZ) in downlink when the cell coverage is extended using the non-transparent Relay Station (RS) in a 2-hop cellular relay system based on IEEE802.16j, which uses the OFDMA-TDD structure. For the analyses, we first introduce the MAC (Media Access Control) frame structure in the non-transparent mode, then we investigate the interfering elements in both AZ and RZ for the network devices such as the Mobile Station (MS) and RS. Through computer simulation, we analyze the cell coverage extension and system throughput in terms of the distance between Base Station (BS) and RS, then we present the amount of the optimal allocation of wireless resource for the AZ and RZ in downlink using our results.

Performance Analysis of HDR-WPAN System with MIMO Techniques (MIMO 기법을 적용한 HDR-WPAN 시스템의 성능분석)

  • Han Deog-Su;Kang Chul-Gyu;Oh Chang-Heon;Cho Sung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1502-1509
    • /
    • 2006
  • In this paper, we proposed reliability and capacity enhancement methods for IEEE 802.15.3 HDR-WPAN (High Data Rate-Wireless Personal Area Network) system which is currently getting an interest in home network technology adopting a MIMO technique. We also analyzed performance or the proposed system through a computer simulation. The HDR-WPAN system using V-BLAST algorithm, transmitting the different signal vector to each other's sub-channel, can get the transmission speed of more than 110Mbps using two Tx/Px antenna without bandwidth expansion in TCM-64QAM mode. Also the proposed system has reliability of 104 at $E_b/N_0=35dB$ under the Rayleigh fading channel in case of two Tx/Rx antenna with MMSE algorithm. The HDR-WPAN system adopting V-BLAST method has its drawback which is very complicated to determine the decision-ordering at the receiver. But, the proposed system enhances the transmission capacity and reliability without extra bandwidth expansion by sending data streams to multiple antennas.

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.

Resolving the 'Gray sheep' Problem Using Social Network Analysis (SNA) in Collaborative Filtering (CF) Recommender Systems (소셜 네트워크 분석 기법을 활용한 협업필터링의 특이취향 사용자(Gray Sheep) 문제 해결)

  • Kim, Minsung;Im, Il
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.137-148
    • /
    • 2014
  • Recommender system has become one of the most important technologies in e-commerce in these days. The ultimate reason to shop online, for many consumers, is to reduce the efforts for information search and purchase. Recommender system is a key technology to serve these needs. Many of the past studies about recommender systems have been devoted to developing and improving recommendation algorithms and collaborative filtering (CF) is known to be the most successful one. Despite its success, however, CF has several shortcomings such as cold-start, sparsity, gray sheep problems. In order to be able to generate recommendations, ordinary CF algorithms require evaluations or preference information directly from users. For new users who do not have any evaluations or preference information, therefore, CF cannot come up with recommendations (Cold-star problem). As the numbers of products and customers increase, the scale of the data increases exponentially and most of the data cells are empty. This sparse dataset makes computation for recommendation extremely hard (Sparsity problem). Since CF is based on the assumption that there are groups of users sharing common preferences or tastes, CF becomes inaccurate if there are many users with rare and unique tastes (Gray sheep problem). This study proposes a new algorithm that utilizes Social Network Analysis (SNA) techniques to resolve the gray sheep problem. We utilize 'degree centrality' in SNA to identify users with unique preferences (gray sheep). Degree centrality in SNA refers to the number of direct links to and from a node. In a network of users who are connected through common preferences or tastes, those with unique tastes have fewer links to other users (nodes) and they are isolated from other users. Therefore, gray sheep can be identified by calculating degree centrality of each node. We divide the dataset into two, gray sheep and others, based on the degree centrality of the users. Then, different similarity measures and recommendation methods are applied to these two datasets. More detail algorithm is as follows: Step 1: Convert the initial data which is a two-mode network (user to item) into an one-mode network (user to user). Step 2: Calculate degree centrality of each node and separate those nodes having degree centrality values lower than the pre-set threshold. The threshold value is determined by simulations such that the accuracy of CF for the remaining dataset is maximized. Step 3: Ordinary CF algorithm is applied to the remaining dataset. Step 4: Since the separated dataset consist of users with unique tastes, an ordinary CF algorithm cannot generate recommendations for them. A 'popular item' method is used to generate recommendations for these users. The F measures of the two datasets are weighted by the numbers of nodes and summed to be used as the final performance metric. In order to test performance improvement by this new algorithm, an empirical study was conducted using a publically available dataset - the MovieLens data by GroupLens research team. We used 100,000 evaluations by 943 users on 1,682 movies. The proposed algorithm was compared with an ordinary CF algorithm utilizing 'Best-N-neighbors' and 'Cosine' similarity method. The empirical results show that F measure was improved about 11% on average when the proposed algorithm was used

    . Past studies to improve CF performance typically used additional information other than users' evaluations such as demographic data. Some studies applied SNA techniques as a new similarity metric. This study is novel in that it used SNA to separate dataset. This study shows that performance of CF can be improved, without any additional information, when SNA techniques are used as proposed. This study has several theoretical and practical implications. This study empirically shows that the characteristics of dataset can affect the performance of CF recommender systems. This helps researchers understand factors affecting performance of CF. This study also opens a door for future studies in the area of applying SNA to CF to analyze characteristics of dataset. In practice, this study provides guidelines to improve performance of CF recommender systems with a simple modification.

  • A Performance Analysis of Distributed Storage Codes for RGG/WSN (RGG/WSN을 위한 분산 저장 부호의 성능 분석)

    • Cheong, Ho-Young
      • The Journal of Korea Institute of Information, Electronics, and Communication Technology
      • /
      • v.10 no.5
      • /
      • pp.462-468
      • /
      • 2017
    • In this paper IoT/WSN(Internet of Things/Wireless Sensor Network) has been modeled with a random geometric graph. And a performance of the decentralized code for the efficient storage of data which is generated from WSN has been analyzed. WSN with n=100 or 200 has been modeled as a random geometric graph and has been simulated for their performance analysis. When the number of the total nodes of WSN is n=100 or 200, the successful decoding probability as decoding ratio ${\eta}$ depends more on the number of source nodes k rather than the number of nodes n. Especially, from the simulation results we can see that the successful decoding rate depends greatly on k value than n value and the successful decoding rate was above 70% when $${\eta}{\leq_-}2.0$$. We showed that the number of operations of BP(belief propagation) decoding scheme increased exponentially with k value from the simulation of the number of operations as a ${\eta}$. This is probably because the length of the LT code becomes longer as the number of source nodes increases and thus the decoding computation amount increases greatly.

    Lip Reading Method Using CNN for Utterance Period Detection (발화구간 검출을 위해 학습된 CNN 기반 입 모양 인식 방법)

    • Kim, Yong-Ki;Lim, Jong Gwan;Kim, Mi-Hye
      • Journal of Digital Convergence
      • /
      • v.14 no.8
      • /
      • pp.233-243
      • /
      • 2016
    • Due to speech recognition problems in noisy environment, Audio Visual Speech Recognition (AVSR) system, which combines speech information and visual information, has been proposed since the mid-1990s,. and lip reading have played significant role in the AVSR System. This study aims to enhance recognition rate of utterance word using only lip shape detection for efficient AVSR system. After preprocessing for lip region detection, Convolution Neural Network (CNN) techniques are applied for utterance period detection and lip shape feature vector extraction, and Hidden Markov Models (HMMs) are then used for the recognition. As a result, the utterance period detection results show 91% of success rates, which are higher performance than general threshold methods. In the lip reading recognition, while user-dependent experiment records 88.5%, user-independent experiment shows 80.2% of recognition rates, which are improved results compared to the previous studies.

    Implementation of an Efficient Slotted CSMA/CA Anti-collision Protocol for Active RFID System (능동형 RFID 시스템을 위한 효율적인 Slotted CSMA/CA 충돌방지 프로토콜의 구현)

    • Joo, Jin-Hoon;Chung, Sang-Hwa
      • The Journal of Korean Institute of Communications and Information Sciences
      • /
      • v.37A no.12
      • /
      • pp.1013-1022
      • /
      • 2012
    • Tag collection is one of the major concerns in radio frequency identification(RFID) system. All tags in RFID reader's transmission range send response message back to the reader in response to collection request message on the given rf channel. When multiple tags respond simultaneously, tag-collision may occur. Tag-collision problem is one of the most important issues in active RFID performance. To mitigate this problem, frame slotted ALOHA(FSA) anti-collision protocol is widely used in active RFID system. Several studies show that the maximum system efficiency of FSA anti-collision protocol is 36.8%. In this paper, we propose an efficient slotted CSMA/CA protocol to improve tag collection performance. We compare our protocol to the FSA anti-collision protocol. For the experiment, an 433MHz active RFID system is implemented, which is composed of an RFID reader and multiple tags. We evaluated the tag collection performance using one RFID reader and 40 tags in the real test bed. The experimental result shows that proposed protocol improves the tag collection time, round and collision probability by 18%, 37.4% and 77.8%, respectively.

    Rollback Dependency Detection and Management with Data Consistency in Collaborative Transactional Workflows (협력 트랜잭셔널 워크플로우에서 데이터 일관성을 고려한 철회 종속성 감지 및 관리)

    • Byun, Chang-Woo;Park, Seog
      • Journal of KIISE:Databases
      • /
      • v.30 no.2
      • /
      • pp.197-208
      • /
      • 2003
    • Abstract Workflow is not appropriately applied to coordinated execution of applications(steps) that comprise business process such as a collaborative series of tasks because of the lacks of network infra, standard of information exchange and data consistency management with conflict mode of shared data. Particularly we have not mentioned the problem which can be occurred by shared data with conflict mode. In this paper, to handle data consistency in the process of rollback for failure handling or recovery policy, we have classified rollback dependency into three types such as implicit rollback dependency in a transactional workflow, implicit rollback dependency in collaborative transactional workflows and explicit rollback dependency in collaborative transactional workflows. Also, we have proposed the rollback dependency compiler that determines above three types of rollback dependency. A workflow designer specifies the workflow schema and the resources accessed by the steps from a global database of resources. The rollback dependency compiler generates the enhanced workflow schema with the rollback dependency specification. The run-time system interprets this specification and executes the rollback policy with data consistency if failure of steps is occurred. After all, this paper can offer better correctness and performance than state-of-the-art WFMSs.

    Implementation of Smart Multi-tap System based on Zigbee Communication (Zigbee 통신 기반 스마트 멀티탭 시스템 구현)

    • Lee, Jung-Hyuck;Kim, Sang-Hyun;Oh, Chang-Se;Seo, Min-Seok;Kim, Young-Don;Park, Hyun-Ju
      • The Journal of Korean Institute of Communications and Information Sciences
      • /
      • v.39C no.10
      • /
      • pp.930-936
      • /
      • 2014
    • Smart Multiple-Tap to be introduced in this paper, is an electronic device that controls the Multibple-Tap through the Smartphone. It runs on network and has an inbuilt Zigbee communication module. Thus, users can control home devices from remote through home server. Mentioned home server is operated as a gateway and is connected with smart devices on the Internet. To sum up, Users using this Smart Multiple-Tap can check the state information of the multi-tap ON/OFF and can control immediately by smartphone. also, Smart Multiple-Tap perfectly shut down the standby power. when users turn off each of the Smart Multiple-Tap's circle, It drives automatically lowest electricity-consuming mode and shut down the standby power by its own built-in SSR module. therefore, it will bring the energy saving effect on environment using Smart Multiple-Tap.

    Speech Animation with Multilevel Control (다중 제어 레벨을 갖는 입모양 중심의 표정 생성)

    • Moon, Bo-Hee;Lee, Son-Ou;Wohn, Kwang-yun
      • Korean Journal of Cognitive Science
      • /
      • v.6 no.2
      • /
      • pp.47-79
      • /
      • 1995
    • Since the early age of computer graphics, facial animation has been applied to various fields, and nowadays it has found several novel applications such as virtual reality(for representing virtual agents), teleconference, and man-machine interface.When we want to apply facial animation to the system with multiple participants connected via network, it is hard to animate facial expression as we desire in real-time because of the size of information to maintain an efficient communication.This paper's major contribution is to adapt 'Level-of-Detail'to the facial animation in order to solve the above problem.Level-of-Detail has been studied in the field of computer graphics to reperesent the appearance of complicated objects in efficient and adaptive way, but until now no attempt has mode in the field of facial animation. In this paper, we present a systematic scheme which enables this kind of adaptive control using Level-of-Detail.The implemented system can generate speech synchronized facial expressions with various types of user input such as text, voice, GUI, head motion, etc.

    • PDF

    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.