• Title/Summary/Keyword: Access source

Search Result 471, Processing Time 0.023 seconds

Relay-assisted Multiple Access Channel Protocol for Cooperative Diversity

  • Kim, Dong-Hyun;Kim, Gil;Lee, Kwang-Bok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1C
    • /
    • pp.1-8
    • /
    • 2009
  • Cooperative diversity is a novel technique to improve diversity gains, capacity gains, and energy saving. This technique involves multiple terminals sharing resources in order to build a virtual antenna array in a distributed fashion. In this paper, we propose a multi-user cooperative diversity protocol called Relay-assisted Multiple Access Channel(R-MAC) that allows multiple source terminals to transmit their signals simultaneously and the relay terminal forwards the aggregated signal received from the source terminals to the destination terminal. The proposed protocol converts the distributed antenna channels into an effective MIMO channel by exploiting a relay, increasing both diversity gain and system throughput. We investigate the performance of the proposed protocol in terms of outage probability and diversity-multiplexing tradeoff where we assume block fading channel environment. Our simulation results show that the proposed protocol outperforms direct transmission in the high spectral efficiency regime where the conventional cooperative diversity protocols cannot outperform direct transmission.

Enhancing the Performance of Coherent Sources SAC OCDMA Networks via Spatial Multiplexing

  • Alhassan, Ahmed M.;Badruddin, Nasreen;Saad, Naufal M.;Aljunid, Syed A.
    • Journal of the Optical Society of Korea
    • /
    • v.17 no.6
    • /
    • pp.471-480
    • /
    • 2013
  • The beating of two or more lasers that have the same or a finite difference in the central frequencies, is the main source of noise in spectral amplitude coding optical code division multiple access (SAC OCDMA) systems. In this paper we adopt a spatial multiplexing (SM) scheme for SAC OCDMA systems to mitigate this beat noise. The results show that for different code weights and different data rates SM SAC can support a larger number of users than the conventional SAC for all different laser source configurations. However, SM SAC requires a more complex system than the conventional SAC, and almost twice as much optical component.

Implementation of RS232C Serial Communication by CSMA protocol (충돌검지 다중접속(CSMA) 프로토콜에 의한 RS232C 직렬통신의 구현)

  • Kwak, Hee-Soo;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2473-2475
    • /
    • 1998
  • In this paper, we implemented RS232C serial communication by the 2 wires(Data,GND), and multiple access, by the applying Collision Sensing Multiple Access(CSMA) Protocol. Multiple access is implemented by assigning a unique ID to each controller. The multiple access control operation starts by sending a command packet from a host to another host and the command packet is composed of ID bytes of source and target host computer, data bytes and the check sum, byte. In host computer, after sending command packet, the collision from loop back data. If collision is detected, it means a command packet was collided with another command packet for another host. The packet communication of the controller enables the multiple acces of the controller through the common serial data link. The application of this serial communication through CSMA protocol and the usage of two wires, have an effect on saving the wires and convenient of layout work.

  • PDF

The case study to verify of a network based on router applying an ACL(: Access List) (ACL(: Access list)이 적용된 라우터 기반 네트워크의 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.491-498
    • /
    • 2016
  • An ACL(: Access List), a list that determines network access, is used for the security of the network. An ACL if applied to a interface of router can filter particular packets. Also it can block or allow the access of certain unauthorized IPs or ports, based on the source address, destination address, and TCP/UDP port. This paper presents a simulation case to verify the effect of a router-based network applying Standard ACL or Extended ACL. The network was created through designing topology and then making a common virtual network using a Packet Tracer.

A Study on Enhancing Subject Access to Fiction Focused on Symbol and Motif (소설 주제 접근체계의 확장 연구 - 상징과 모티프를 중심으로 -)

  • Kim, Na-Reum;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.69-87
    • /
    • 2006
  • The access to literary works, including fictions, has focused on descriptive elements, and the subject access has been confined to denotative elements such as the subject matter, name of character and geographical name, etc, which appear in the work. This practice will not lead to the essence of subject of fiction, and does not reflect the demand of users for the subject who pursue aesthetic experience. In this study, concepts of symbol and motif and their possibility to be used as subject access point are considered to enhance a subject access scheme. In addition, this study tries to build the scheme of symbol and motif by using the glossary as the source of information. The composed schemes are applied to 20th century Korean fictions and its usability and limits are discussed.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

Performance Evaluation of the Probability based MAC Protocol for Fair Transmission in WDM Metro Ring (WDM 메트로 링에서 공정한 전송을 위한 확률기반 MAC 프로토콜에 대한 성능 평가)

  • So Won-Ho;Kim Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.323-332
    • /
    • 2006
  • In this paper, we consider a WDM based metro ring connecting broadband access networks by using FT-TR (Fixed Transmitter-Tunable Receiver) type access nodes and a new MAC protocol for fair transmission is proposed. The basic channel access scheme is CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) and the transferred optical slot is changed to be empty slot by SS(Source-Stripping) which drops a packet from ring-rotated slot. This empty slot can be either used to send head-of-line packet in buffer or transmitted to next access node. In former cases, there is the improvement of network throughput, but latter case leads unfairness problem of transmission. Thus the proposed MAC protocol exploits the advantages form tow cases. It gives downstream access nodes chance to use empty slots and limits the unconditional usage of empty slots at upstream access nodes with probability as called p-Persistent MAC protocol. We use a numerical analysis to evaluate bandwidth efficiency and maximum node throughput and compares simulation results in terms of node throughput, fairness factor, transfer delay depending on probability. Under two different FT-TR type architectures for metro ring network the proposed MAC protocol is evaluated and compared.

A bidirectional full duplex medium access control protocol for underwater acoustic networks (수중 음향 네트워크를 위한 양방향 전이중 매체 접속 제어 프로토콜)

  • Kang, Sung Min;Hwang, Ho Young;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.211-217
    • /
    • 2017
  • In this paper, we propose a bidirectional full duplex MAC (Medium Access Control) protocol for underwater acoustic networks. An underwater sensor node can set a back-off timer according to the priority of transmission. When the back-off timer expires, the underwater sensor node acquires a transmission opportunity. If a source node wants to send data to a destination node, it broadcasts RTS (Request-To-Send) including ID of the destination node to neighbor nodes. The destination node receiving RTS sends CTS (Clear-To-Send) to the source node to inform the bidirectional full duplex communication. After the source node receives CTS, the source node and the destination node can send the data to each other. In the underwater environment, the existing MAC protocol may take a lot of time for successful transmission of data due to long underwater propagation delay. On the other hand, the proposed bidirectional full duplex MAC protocol improves the throughput by shortening the time for successful transmission of data. In this paper, we analyze the throughput of the proposed bidirectional full duplex MAC protocol. In addition, we show that the proposed bidirectional full duplex MAC protocol has better performance in the presence of the long underwater propagation delay compared with existing MAC protocols for underwater environments.

Policy Suggestions to Improve Patient Access to New Drugs in Korea (환자의 신약 접근성 강화 정책 제안)

  • Choi, Yoona;Lee, Howard
    • Korean Journal of Clinical Pharmacy
    • /
    • v.31 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Objective: This study aimed to overview and assess the effectiveness of the policies and regulations that have governed new drug access in Korea, and to propose policies to enhance patient access to drugs, particularly for new innovative medicines. Methods: We approached drug access issues in two perspectives: approval lag (or availability) and reimbursement lag (or affordability). The issues were identified and evaluated through the review of literature, public documents, reports published by the government agencies and private organizations, and news articles. Results: To shorten approval lag, it is recommended to hire and train more reviewers at the Ministry of Food and Drug Safety. Increasing user fees to a realistic level can facilitate this process. To reduce reimbursement lag, flexible incremental cost-effectiveness ratio threshold, alternative cost-effectiveness evaluation, and establishment of funding source other than the national health insurance are identified as the areas to be improved. Conclusion: The current policies and regulations had to be supplemented by new systems to drastically promote patient accessibility to new drugs, consequently in order to promote national public health.

Multi-level Analysis of the Antecedents of Knowledge Transfer: Integration of Social Capital Theory and Social Network Theory (지식이전 선행요인에 관한 다차원 분석: 사회적 자본 이론과 사회연결망 이론의 결합)

  • Kang, Minhyung;Hau, Yong Sauk
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Knowledge residing in the heads of employees has always been regarded as one of the most critical resources within a firm. However, many tries to facilitate knowledge transfer among employees has been unsuccessful because of the motivational and cognitive problems between the knowledge source and the recipient. Social capital, which is defined as "the sum of the actual and potential resources embedded within, available through, derived from the network of relationships possessed by an individual or social unit [Nahapiet and Ghoshal, 1998]," is suggested to resolve these motivational and cognitive problems of knowledge transfer. In Social capital theory, there are two research streams. One insists that social capital strengthens group solidarity and brings up cooperative behaviors among group members, such as voluntary help to colleagues. Therefore, social capital can motivate an expert to transfer his/her knowledge to a colleague in need without any direct reward. The other stream insists that social capital provides an access to various resources that the owner of social capital doesn't possess directly. In knowledge transfer context, an employee with social capital can access and learn much knowledge from his/her colleagues. Therefore, social capital provides benefits to both the knowledge source and the recipient in different ways. However, prior research on knowledge transfer and social capital is mostly limited to either of the research stream of social capital and covered only the knowledge source's or the knowledge recipient's perspective. Social network theory which focuses on the structural dimension of social capital provides clear explanation about the in-depth mechanisms of social capital's two different benefits. 'Strong tie' builds up identification, trust, and emotional attachment between the knowledge source and the recipient; therefore, it motivates the knowledge source to transfer his/her knowledge to the recipient. On the other hand, 'weak tie' easily expands to 'diverse' knowledge sources because it does not take much effort to manage. Therefore, the real value of 'weak tie' comes from the 'diverse network structure,' not the 'weak tie' itself. It implies that the two different perspectives on strength of ties can co-exist. For example, an extroverted employee can manage many 'strong' ties with 'various' colleagues. In this regards, the individual-level structure of one's relationships as well as the dyadic-level relationship should be considered together to provide a holistic view of social capital. In addition, interaction effect between individual-level characteristics and dyadic-level characteristics can be examined, too. Based on these arguments, this study has following research questions. (1) How does the social capital of the knowledge source and the recipient influence knowledge transfer respectively? (2) How does the strength of ties between the knowledge source and the recipient influence knowledge transfer? (3) How does the social capital of the knowledge source and the recipient influence the effect of the strength of ties between the knowledge source and the recipient on knowledge transfer? Based on Social capital theory and Social network theory, a multi-level research model is developed to consider both the individual-level social capital of the knowledge source and the recipient and the dyadic-level strength of relationship between the knowledge source and the recipient. 'Cross-classified random effect model,' one of the multi-level analysis methods, is adopted to analyze the survey responses from 337 R&D employees. The results of analysis provide several findings. First, among three dimensions of the knowledge source's social capital, network centrality (i.e., structural dimension) shows the significant direct effect on knowledge transfer. On the other hand, the knowledge recipient's network centrality is not influential. Instead, it strengthens the influence of the strength of ties between the knowledge source and the recipient on knowledge transfer. It means that the knowledge source's network centrality does not directly increase knowledge transfer. Instead, by providing access to various knowledge sources, the network centrality provides only the context where the strong tie between the knowledge source and the recipient leads to effective knowledge transfer. In short, network centrality has indirect effect on knowledge transfer from the knowledge recipient's perspective, while it has direct effect from the knowledge source's perspective. This is the most important contribution of this research. In addition, contrary to the research hypothesis, company tenure of the knowledge recipient negatively influences knowledge transfer. It means that experienced employees do not look for new knowledge and stick to their own knowledge. This is also an interesting result. One of the possible reasons is the hierarchical culture of Korea, such as a fear of losing face in front of subordinates. In a research methodology perspective, multi-level analysis adopted in this study seems to be very promising in management research area which has a multi-level data structure, such as employee-team-department-company. In addition, social network analysis is also a promising research approach with an exploding availability of online social network data.

  • PDF