• Title/Summary/Keyword: IEEE-Standard

Search Result 834, Processing Time 0.026 seconds

Design and Performance of a CC-NUMA Prototype Card for SCI-Based PC Clustering (SCI 기반 PC 클러스터링을 위한 CC-NUMA 프로토타입 카드의 설계와 성능)

  • Oh, Soo-Cheol;Chung, Sang-Hwa
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.1
    • /
    • pp.35-41
    • /
    • 2002
  • It is extremely important to minimize network access time in constructing a high-performance PC cluster system For an SCI based PC cluster it is possilbe to reduce the network access time by maintaining network cache in each cluster node, This paper presents a CC-NUMA card that utilizes network cache for SCI based PC clustering The CC-NUMA card is directly plugged into the PCI solot of each node, and contains shared memory network cache, and interconnection modules. The network cache is maintained for the shared memory on the PCI bus of cluster nodes. The coherency mechanism between the network cache and the shared memory is based on the IEEE SCI standard. A CC-NUMA prototype card is developed to evaluate the performance of the system. According to the experiments. the cluster system with the CC-NUMA card showed considerable improvements compared with an SCI based clustser without network cache.

Priority Collision Resolution Algorithm on HFC Networks (우선 순위를 고려한 HFC 망의 충돌 해소 알고리즘)

  • 김변곤;박준성;정경택;전병실
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1252-1260
    • /
    • 1999
  • The HFC network has a architecture of a star topology in fiber optic trunks, and tree and branch topology is used in the part of coaxial cable. It is well known that the HFC upstream channel is noisy. Ingress, common mode distortion and impulse noise exist in the upstream channel. In order to provide Quality of Service(QoS) to users with real-time data such as voice, video and interactive services, the evolving IEEE 802.14 standard for HFC networks must include an effective priority scheme. The scheme separates and resolves collisions between stations in a priority order. It is important to simulate protocols under a practical environment. The proposed algorithm in this paper is simulated with the assumption that the collision detector made certain mistake due to noises. Simulation results show that the proposed algorithm is more efficient than existing tree-based algorithm under practical environment.

  • PDF

Development of Asynchronous Blocking Algorithm through Asynchronous Case Study of Steam Turbine Generator (스팀터빈 발전기 비동기 투입 사례연구를 통한 비동기 방지 알고리즘 개발)

  • Lee, Jong-Hweon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1542-1547
    • /
    • 2012
  • Asynchronous phenomenon occurs on the synchronous generators under power system when a generator's amplitude of electromagnetic force, phase angle, frequency and waveform etc become different from those of other synchronous generators which can follow instantly varying speed of turbine. Because the amplitude of electromagnetic force, phase frequency and waveform differ from those of other generators with which are to be put into parallel operation due to the change of excitation condition for load sharing and the sharing load change, if reactive current in the internal circuit circulates among generators, the efficiency varies and the stator winding of generators are overheated by resistance loss. When calculation method of protection settings and logic for protection of generator asynchronization will be recommended, a distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome asynchronizing protection, this paper describes an improved backup protection coordination scheme using a new logic that will be suggested.

A Case Study on the Application of Systems Engineering to the Development of PHWR Core Management Support System (시스템엔지니어링 기법을 적용한 가압중수로 노심관리 지원시스템 개발 사례)

  • Yeom, Choong Sub;Kim, Jin Il;Song, Young Man
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.9 no.1
    • /
    • pp.33-45
    • /
    • 2013
  • Systems Engineering Approach was applied to the development of operator-support core management system based on the on-site operation experience and document of core management procedures, which is for enhancing operability and safety in PHWR (Pressurized Heavy Water Reactor) operation. The dissertation and definition of the system were given on th basis of investigating and analyzing the core management procedures. Fuel management, detector calibration, safety management, core power distribution monitoring, and integrated data management were defined as main user's requirements. From the requirements, 11 upper functional requirements were extracted by considering the on-site operation experience and investigating documents of core management procedures. Detailed requirements of the system which were produced by analyzing the upper functional requirements were identified by interviewing members who have responsibility of the core management procedures, which were written in SRS (Software Requirement Specification) document by using IEEE 830 template. The system was designed on the basis of the SRS and analysis in terms of nuclear engineering, and then tested by simulation using on-site data as a example. A model of core power monitoring related to the core management was suggested and a standard process for the core management was also suggested. And extraction, analysis, and documentation of the requirements were suggested as a case in terms of systems engineering.

Computing Curriculum Design in Secondary School Focused On Computer Science Curriculum (컴퓨터과학 교육을 중심으로 한 중등 컴퓨팅 교육과정 설계)

  • Shin, SangKook;Kwon, DaeYong;Kim, HyungShin;Yeum, YongCheu|;Yoo, SeungWook;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.3
    • /
    • pp.61-76
    • /
    • 2005
  • The seventh secondary computer education curriculum is focused on computer literacy education. This computer curriculum is an elective course not a required course and is a part of other specific course. This computer education has problems that it is not consecutive, overlapped with other classes and not systematic. This research analyzes the computer education in Israel, India, and Japan. And it suggests the new secondary school computing education curriculum based on computer educating of Computer Curricula 2001 Computer Science, lEEE Computer Society and ACM has suggested 2001 for computer science education in university, and with a standard of 'A Model Curriculum for K-12 Computer Science', the suggestion for computer-science education for all grade of school.

  • PDF

Design of a High Efficiency Class E Amplifier for Wireless LAN (무선 LAN용 고효율 E급 증폭기 설계)

  • Park Chan-Hyuck;Koo Kyung-Heon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.91-96
    • /
    • 2006
  • High efficiency switching mode circuits such as class I amplifiers have been well known in the MHz frequency range. The class E amplifier is a type of switching mode amplifier offering very high efficiency approaching 100%. In this paper, the class E amplifier has been designed by using the harmonic balance method of circuit simulator. The designed amplifier is realized by using pHEMT and microstrip line, shows 66% power added efficiency (PAE) at 2.4GHz with 17.6dBm output power. With -3dBm input power of wireless LAN, measured output spec01m can meet the required IEEE 802.11g standard spectrum mask. That means the required amplifier back off of 9dB from $P_{ldB}$ to satisfy the required wireless LAN spectrum mask.

Resource Request Scheduling for Best Effort Service in Wireless MAN : Performance Analysis (Wireless MAN에서 Best Effort 서비스를 위한 자원 요청 스케줄링 방식의 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.57-60
    • /
    • 2003
  • IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple service. Among the service classes supported by the wireless MAN, the BE class is ranked on the lowest position in priority and is usually deployed by multicast and broadcast polling MAC scheme. In provisioning such BE service, the delay performance is influenced by a number of components including restrictions on resource request per SS, the number of request opportunities in upward frame, scheduling requests at BS, and contention resolution method. As candidate components of MAC function for BE service, we propose single and multiple request schemes (for controling the number of requests per SS), exhaustive and limited request schemes (for regulating the amount of grant per request) and FCFS, H-SMF, pure SMF, SS-wise Round Robin, and pure Round Robin (for scheduling requests at BS). Then, we construct MAC schemes by combining the above components and evaluate the delay performance exhibited by each MAC scheme using a simulation method. From numerical results, we investigate the effect of MAC components on average delay and delay variation and observe the dissonance on collision reduction in a resource - limited environment.

  • PDF

Neural network design for Ambulatory monitoring of elderly

  • Sharma, Annapurna;Lee, Hun-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.265-269
    • /
    • 2008
  • Home health care with compact wearable units sounds to be a convenient solution for the elderly people living independently. This paper presents a method to detect fall from the other activities of daily living and also to classify those activities. This kind of ambulatory monitoring enables them to get an emergency help in the case of the fatal fall event and can provide their general health status by observing the activities being performed in daily life. A tri-axial accelerometer sensor is used to get the acceleration anomalies associated with the user's movements. The three axis acceleration data are transferred to the base station sensor node via an IEEE 802.15.4 compliant zigbee module. The base station sensor node sends the data to base station PC for an offline processing. This work shows the feature set preparation using the principal component analysis (PCA) for the designing of neural network. The work includes the most common activities of daily living (ADL) like Rest, Walk and Run along with the detection of fall events from ADL. The angle from the vertical is found to be the most significant feature parameter for classification of fall while mean, standard deviation and FFT coefficients were used as the feature parameter for classifying the other activities under consideration. The accuracy for detection of fall events is 86%. The overall accuracy for ADL and fall is 94%.

  • PDF

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

Radio Resource Sharing using Power Control of Base-station in Cognitive Radio System (코그니티브 라디오 시스템에서의 전력 제어를 이용한 무선 자원 공유)

  • Kwon, Yang-Soo;Ji, Young-Geun;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10A
    • /
    • pp.1057-1064
    • /
    • 2007
  • Cognitive radio(CR) technique which utilizes empty frequency bands allocated to private business but not being used temporally has been researched. According to the standard, CR users detect the primary user using the same channel, CR users should move to the another channel to guarantee the primary user's decodability. Thus, CR systems cannot use the same channel and support the CR user's QoS(Quality of Service) during the channel moving time. In this paper, we propose a radio resource sharing method that CR basestation controls the transmission power with the primary user's SNR(Signal to Noise Ratio) to increase the spectral efficiency of area and to minimize the outage of CR users. In addition, computer simulation demonstrates show that the proposed method improved spectral efficiency of area and decreased outage probability of CR users.