• Title/Summary/Keyword: Building ID

Search Result 44, Processing Time 0.021 seconds

Density Evolution Analysis of RS-A-SISO Algorithms for Serially Concatenated CPM over Fading Channels (페이딩 채널에서 직렬 결합 CPM (SCCPM)에 대한 RS-A-SISO 알고리즘과 확률 밀도 진화 분석)

  • Chung, Kyu-Hyuk;Heo, Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.7 s.337
    • /
    • pp.27-34
    • /
    • 2005
  • Iterative detection (ID) has proven to be a near-optimal solution for concatenated Finite State Machines (FSMs) with interleavers over an additive white Gaussian noise (AWGN) channel. When perfect channel state information (CSI) is not available at the receiver, an adaptive ID (AID) scheme is required to deal with the unknown, and possibly time-varying parameters. The basic building block for ID or AID is the soft-input soft-output (SISO) or adaptive SISO (A-SISO) module. In this paper, Reduced State SISO (RS-SISO) algorithms have been applied for complexity reduction of the A-SISO module. We show that serially concatenated CPM (SCCPM) with AID has turbo-like performance over fading ISI channels and also RS-A-SISO systems have large iteration gains. Various design options for RS-A-SISO algorithms are evaluated. Recently developed density evolution technique is used to analyze RS-A-SISO algorithms. We show that density evolution technique that is usually used for AWGN systems is also a good analysis tool for RS-A-SISO systems over frequency-selective fading channels.

Building Boundary Reconstruction from Airborne Lidar Data by Adaptive Convex Hull Algorithm (적응적 컨벡스헐 알고리즘을 이용한 항공라이다 데이터의 건물 경계 재구성)

  • Lee, Jeong-Ho;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.3
    • /
    • pp.305-312
    • /
    • 2012
  • This paper aims at improving the accuracy and computational efficiency in reconstructing building boundaries from airborne Lidar points. We proposed an adaptive convex hull algorithm, which is a modified version of local convex hull algorithm in three ways. The candidate points for boundary are first selected to improve efficiency depending on their local density. Second, a searching-space is adjusted adaptively, based on raw data structure, to extract boundary points more robustly. Third, distance between two points and their IDs are utilized in detecting the seed points of inner boundary to distinguish between inner yards and inner holes due to errors or occlusions. The practicability of the approach were evaluated on two urban areas where various buildings exist. The proposed method showed less shape-dissimilarity(8.5%) and proved to be two times more efficient than the other method.

Modeling and Analysis of Supercapacitor Bank System for Hybrid Energy System (하이브리드에너지시스템용 슈퍼캐패시터 Matlab/Simulink 모델개발)

  • Cho, Jea-Hoon;Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.10a
    • /
    • pp.285-289
    • /
    • 2009
  • In this paper, we propose to research the dynamic Matlab/Simulink model of supercapacitor bank(SCB) for a microgrid application. We demonstrated that this model id sufficient to design the control system of entire power storage system, SCB, the chopper and grid connected converter. The proposed dynamic model is simulated with the help of Matlab/$Simulink^{TK}$ in the MTG/PC/SCB hybrid energy system. The study results show that SCB have a good performance to curb power fluctuation in building microgrid application.

  • PDF

Zone-Based Self-Organized Clustering with Byzantine Agreement in MANET

  • Sung, Soon-Hwa
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.221-227
    • /
    • 2008
  • The proposed zone-based self-organized clustering broadcasts neighbor information to only a zone with the same ID. Besides, the zone-based self-organized clustering with unique IDs can communicate securely even if the state transition of nodes in zone-based self-organized clustering is threatened by corrupted nodes. For this security, the Byzantine agreement protocol with proactive asynchronous verifiable secret sharing (AVSS) is considered. As a result of simulation, an efficiency and a security of the proposed clustering are better than those of a traditional clustering. Therefore, this paper describes a new and extended self-organized clustering that securely seeks to minimize the interference in mobile ad hoc networks (MANETs).

The Research of Effectively Matching Method of Building Objects to Register UFID (유일식별자 부여를 위한 건물객체의 효율적인 중첩방안 연구)

  • Moon, Yong-Hyun;Park, Ki-Surk;Choi, Seok-Keun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.2
    • /
    • pp.75-83
    • /
    • 2011
  • After 1995, as a part of national geographic information system project, there are a lot of researches about combinations and connections of national geographic information system. However, systematic standard for combinations and connections of geographic information is uncertain, and each organization has different identification system which leads to difficulties in connection of geographic information system. This study suggests repeating method about geographic information objects to grant UFID based on national standards of geographic information system, and analyzes the repeating rate.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

LTRE: Lightweight Traffic Redundancy Elimination in Software-Defined Wireless Mesh Networks (소프트웨어 정의 무선 메쉬 네트워크에서의 경량화된 중복 제거 기법)

  • Park, Gwangwoo;Kim, Wontae;Kim, Joonwoo;Pack, Sangheon
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.976-985
    • /
    • 2017
  • Wireless mesh network (WMN) is a promising technology for building a cost-effective and easily-deployed wireless networking infrastructure. To efficiently utilize limited radio resources in WMNs, packet transmissions (particularly, redundant packet transmissions) should be carefully managed. We therefore propose a lightweight traffic redundancy elimination (LTRE) scheme to reduce redundant packet transmissions in software-defined wireless mesh networks (SD-WMNs). In LTRE, the controller determines the optimal path of each packet to maximize the amount of traffic reduction. In addition, LTRE employs three novel techniques: 1) machine learning (ML)-based information request, 2) ID-based source routing, and 3) popularity-aware cache update. Simulation results show that LTRE can significantly reduce the traffic overhead by 18.34% to 48.89%.

Design and Implementation of Wireless standby Power Control System for Energy Saving (에너지 절감을 위한 무선 대기전력 제어 시스템 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.19-27
    • /
    • 2013
  • This paper implements the standby power control system composed of a master device and slave devices. The standby power is managed by cutting power supply after controlling the relay of a slave device based on the authentication of master device's RFID card. RFID interface and wireless communication module are embedded in a master device, and one master device is linked with many slave devices in wireless. Each slave device executes the operation needed in power control independently. We implements the function of manual power on/off system in a slave device, and the function of user ID enrollment by switch manipulation in a master device. Also this system can communicate bidirectionally in wireless and runs on TinyOS. The result of experiment shows that the user authentication is executed in a master device and this authenticated information is transmitted to a slave device in wireless, and standby power is cutted by controlling the relay of a slave device. Installing this system in a building or an office, we can expect energy saving.

Linking Toponym Database with Digital Map Database (지명 활용을 위한 지명 DB와 수치지도 DB의 연계 방안 연구)

  • Choi, Jinmu;Kim, Min Jun;Choi, Don Gon
    • Journal of the Korean Geographical Society
    • /
    • v.49 no.2
    • /
    • pp.310-319
    • /
    • 2014
  • The purpose of this study was building a new method for map making with a toponym by connecting a toponym DB with a digital topographic map DB. First, the table of toponym history in the toponym DB was revised. Second, a table linking the toponym DB and the digital topographic map DB was added. To integrate the toponym DB and the digital topographic map DB, a loose-coupling method was suggested and the combination of legal Dong and a toponym could be used as ID for liking those two databases. Thus, the method presented in this study would be used for effective map making using a toponym. Through the improvement of a toponym DB, it is expected the active use of the toponym DB such as map making.

  • PDF