• Title/Summary/Keyword: Equal Access Point

Search Result 12, Processing Time 0.025 seconds

A Study on the Description of Personal Name Access Point Control Ontology Using Axiom Definition (공리정의를 이용한 인명접근점제어 온톨로지 기술에 관한 연구)

  • Kang, Hyen-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.157-174
    • /
    • 2012
  • This study tries to describe personal name access point control ontology for the American novelist Mark Twain using RDF/OWL axiom to control access point based on the ontology. The Axiom used in this study are disjoint with class, domain and range, property cardinality, inverse functional property, individual and literal data property. As a result, in the ontology environment we can accept various access points as equal access points exclusive of authority heading and heading concept. It can successfully describe Mark Twain's personal name access point control ontology and display using the OntoGraf.

An Improvement on FFT-Based Digital Implementation Algorithm for MC-CDMA Systems (MC-CDMA 시스템을 위한 FFT 기반의 디지털 구현 알고리즘 개선)

  • 김만제;나성주;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.1005-1015
    • /
    • 1999
  • This paper is concerned with an improvement on IFFT (inverse fast Fourier transform) and FFT based baseband digital implementation algorithm for BPSK (binary phase shift keying)-modulated MC-CDMA (multicarrier-code division multiple access) systems, that is functionally equivalent to the conventional implementation algorithm, while reducing computational complexity and bandwidth requirement. We also derive an equalizer structure for the proposed implementation algorithm. The proposed algorithm is based on a variant of FFT algorithm that utilizes a N/2-point FFT/IFFT for simultaneous transformation and reconstruction of two N/2-point real signals. The computer simulations under additive white Gaussian noise channels and frequency selective fading channels using equal gain combiner and maximal ratio combiner diversities, demonstrate the performance of the proposed algorithm.

  • PDF

Design and Implementation of 2.4 ㎓ and 5 ㎓ Dual Band Antenna for Access Point of Wireless LAN (무선 LAN 엑세스 포인트용 2.4 GHz, 5 GHz 이중공진 안테나의 설계 및 구현)

  • 김창일;오종대;양운근;김성민
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.3
    • /
    • pp.304-311
    • /
    • 2003
  • In this paper, we present the 2.4 ㎓ and 5 ㎓ dual band antenna fur access point of WLAN(Wireless Local Area Network). The proposed antenna must have equal gains in both frequency bands to accept two services. We proposed using collinear array to compensate gain difference for two different frequency bands. Simulation results using 3D simulation program, CST MWS(Microwave Studio), for dual band antenna with collinear away show that the maximum gain is about 4.7 dBi at 2.4 ㎓, 5.2 dBi at 5.7 ㎓. We got additional gain of about 2.1 ㏈ with collinear array for 2.4 ㎓ in measurement. Measured results for the dual band antenna with collinear array show applicable performances for access point of wireless LAN.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

A Scheduling Algorithm of AP for Alleviating Unfairness Property of Upstream-Downstream TCP Flows in Wireless LAN (무선 랜에서의 상.하향 TCP 플로우 공평성 제고를 위한 AP의 스케쥴링 알고리즘 연구)

  • Lim, Do-Hyun;Seok, Seung-Joon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1521-1529
    • /
    • 2009
  • There is a serious unfairness problem between upstream and downstream flows of AP in IEEE 802.11 Wireless LAN. This problem is because Wireless LAN's DCF MAC protocol provides AP with equal channel access priority to mobile noded. Also, it makes this problem worse that the TCP's Data segment loss is more effective on throughput than the TCP's ACK segment. In this paper, we first make several simulations to analysis the unfairness in the various point of view and to find reasons of the unfairness. Also, this paper presents AP's scheduling scheme to alleviate the unfairness problem and evaluate the scheme through ns2 simulator.

  • PDF

The Study on the Policies far Public Library Services to Older Persons (공공 도서관의 노인 서비스 정책에 관한 연구)

  • 김선호
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.4
    • /
    • pp.101-123
    • /
    • 2002
  • UN has decided to observe the year 1999 as the International Year of Older Persons (IYOP). Since that year, older persons should have equal access to information in order to function effectively in an information society for all. Public library should be a important access point for older persons, and above all, be a leading ole to bridge digital devide in the regional community. There are, however, few policies or guidelines for public library services to older persons in Korea. This is a time fur developing these ones at the national level. In this study, the draft for public library services to older persons is suggested.

  • PDF

A Study on the Cross-Reference System based on Bibliographic Relations (서지적 관계유형에 기반한 참조시스템에 관한 연구)

  • Lee Yang-Sook;Kim Tae-Soo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.33 no.4
    • /
    • pp.65-83
    • /
    • 1999
  • This study is intended to build a cross-reference system as syndetic device to provide bibliographic relations and to collocate variant access points through references, by developing a reference record format. To this end, the method of this study are as follows: First, the roles of references, which have long been used in traditional records, have been reviewed. Second, ways in which references are depicted not only by current cataloging rules but also by authority control systems are examined. Major characteristics of the reference record are summarized as fellows: 1) If variations either of an author name or of a title are made, or any related works are published, only a single reference record is created. This record uses existing authority records, and instead of adopting authority headings, it will expand the function of the explanatory reference as well as newly implementing a relational reference which can later be used as a reference record. 2) All the variations of identical personal or group names and of lilies are dealt as one access point. In place of current 'see' and 'see also' references, not drawing lines between authority heading(1XX field), 'see'(4XX field) and 'see also' reference(5XX field), all forms of names will be simply applied to record field '1XX'. 3) Any form of data elements, which are used as access points, will be described in '1XX' which has equal value. When a need arises to explain relationships between various access points, it can be met by applying the general explanation reference-name(666 field). Similarly, when there is a need to articulate bibliographic relationships between related works, they will be suggested through the title and relational reference. 4) The title and relational reference regulates related terms that each relation type contains its field, according to each relational type, by reclassifying entire fields in order to provide direct bibliographic relation types on reference records. 5) Pointers which are connected to each access point present reference control numbers.

  • PDF

A Dynamic Bandwidth Tuning Mechanism for DQDB in Client-Server Traffic Environments (클라이언트-서버 트래픽 환경에서 분산-큐 이중-버스의 동적 대역폭 조절 방식)

  • Kim, Jeong-Hong;Kwon, Oh-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3479-3489
    • /
    • 2000
  • Most of the study on fairness control method for Distributed-Queue Dual-Bus(DQDB) have been performed under specific load types such as equal probability load types or symmetric load types. On Web-based internet enviroments client-server load types are more practical traffic patlerns than specrfic load types. In this paper, an effiective fairness control method to distribute DQDR network bandwidth fairly to all stations under a client-server load is proposed. In order to implement a dynamic bandwidth timing capabihty needed to distribute the bandwidth fairty at heavy loads, the proposed method uses two pararnetexs, one is an access hrnit to legulate each station's packet transmission and the other is the number of extra emply slots that are yielded to downstream stations. In point of implementation this mechanism is simpler and easier than Bandwidth Tuning Mechanism(BTM) that uses an intermediate pattern and an adptation function. Simulation results show that it outperforms othen mecharusms.

  • PDF

Channel Estimation and Analog Beam Selection for Uplink Multiuser Hybrid Beamforming System (상향링크 다중사용자 하이브리드 빔포밍 시스템에서 채널 추정과 아날로그 빔 선택 방법)

  • Kim, Myeong-Jin;Ko, Young-Chai
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.459-468
    • /
    • 2015
  • In this paper, we consider an uplink multiuser hybrid beamforming system where an access point (AP) communicates with multiple users simultaneously. The performance of the uplink multiuser hybrid beamforming system depends on the effective channel which is given by the product of the channel matrix and the analog beams. Therefore, to maximize the performance, we need to obtain the channel information and then select the analog beams appropriately by using the acquired channel information. In this paper, we propose the channel estimation method and low complexity analog beam selection algorithm for the uplink multiuser hybrid beamforming system. Additionally, our analysis shows that the proposed low complexity analog beam selection algorithm provides much less complexity than the optimum analog beam selection algorithm. From the numerical results, we confirm that the proposed low complexity analog beam selection algorithm has little performance degradation in spite of much less complexity than the optimum analog beam selection algorithm under the equal system configuration.

An analysis on the S-boxes of block ciphers in 3GPP (3GPP 블록 암호의 S-box 안전성 분석)

  • 장구영;강주성;이옥연;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.67-75
    • /
    • 2001
  • 3GPP proposed f8 and f9 algorithms based on the block cipher KASUMI to provide the data confidentiality and integrity over a radio access link for IMT-2000(W-CDMA). Also 3GPP proposed Milenage algorithm based on the block cipher Rijndael to provide an example set for 3GPP authentication and key generation functions. In order to analyze the security of 3GPP algorithms, we must go ahead an analysis of security of KASUMI and Rijndael. Since S-box is an important point of security of block cipher, in this paper we analyze the S-boxes of KASUMI and Rijndael and compare the S-boxes of KASUMI with the S-box of Rijndael. Although KASUMI S9-box is bad for AC and SAC, we find that AC of KASUMI FI function containing S7-box and S9-box is equal to AC of Rijndael S-box and SAC of KASUMI FI function is better than SAC of Rijndael S-box.