• Title/Summary/Keyword: PCM algorithm

Search Result 65, Processing Time 0.033 seconds

Spatial Reuse based on Power Control Algorithm Ad hoc Network (IEEE 802.11 기반의 모바일 애드 혹 네트워크에서 전력제어 알고리즘을 통한 공간 재사용)

  • Lee, Seung-Dae;Jung, Yong-Chae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.119-124
    • /
    • 2010
  • The MAC layer in ad-hoc network which makes network of nodes without infrastructure for a time has became an issue to reduce delay, allocate fairly bandwidth, control TX/RX power and improve throughput. Specially, the problem to reduce power consumption in ad-hoc network is very important part as ad-hoc devices use the limited battery. For solution of the problem, many power control algorithms, such as distribute power control, PCM (Power Control MAC) and F-PCF (Fragmentation based PCM), are proposed to limit power consumption until now. Although the algorithms are designed to minimize power consumption, the latency communication zone is generated by power control of RX/TX nodes. However the algorithms don't suitably reuse the space. In this paper proposes the algorithm to improve data throughput through Spatial Reuse based on a power control method.

Telemetry Data Recovery Method Using Multiple PCM Data (다중 PCM 데이터를 이용한 텔레메트리 데이터 복구 방법)

  • Jung, Haeseung;Kim, Joonyun
    • Aerospace Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.96-102
    • /
    • 2012
  • Recently, interests about frame error reduction method, using multiple PCM data which are received at several ground stations, are increasing. Simple data merge method is already applied to data processing system at Naro Space Center and have been used in the first and the second flight test analysis of KSLV-I. This paper is focused on error reduction with error correcting merge algorithm and time-delayed data correction algorithm. Result of applying the proposed algorithms to the flight test data shows 1.32% improvement in error rate, compared to simple-data-merge method. It is considered that presented algorithms could be very useful in generating various telemetry merge data.

신호장치 유지보수를 위한 채널별 신호상태분석 알고리즘 개발

  • 윤달환;임제탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.318-326
    • /
    • 1993
  • It is not easy to diagnose rapidly the cause of trouble in the signal service which is currently provided by the fully electronic switching system such as TDX. To solve these problems, it is necessary to acquire and analyze the service signal. This paper describes the development of PCM acquirer which can analyze the signal characteristics by acquiring the PCM signal in SHW(subhighway). Also an algorithm which analyzes the acquired signal and determines the signal frequency si discussed by using CZT.

  • PDF

An ACA-based fuzzy clustering for medical image segmentation (적응적 개미군집 퍼지 클러스터링 기반 의료 영상분할)

  • Yu, Jeong-Min;Jeon, Moon-Gu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.367-368
    • /
    • 2012
  • Possibilistic c-means (PCM) 알고리즘은 fuzzy c-means (FCM) 의 노이즈 민감성을 극복하기 위해 제안 되었다. 하지만, PCM 은 사용되는 시스템 파라미터들의 초기화와 coincident 클러스터링 문제로 인하여 그 성능이 민감하다. 본 논문에서는 이러한 문제점들을 극복하기 위해 개미군집 알고리즘(Ant colony algorithm)을 이용한 퍼지 클러스터링(fuzzy clustering) 알고리즘을 제안한다. 먼저, 개미군집 알고리즘을 통해 PCM 의 클러스터 개수 및 중심 값 파라미터를 최적화 하고, 미리 분류된 화소 정보를 이용하여 PCM 의 coincident 클러스터링 문제를 해결하였다. 제안된 알고리즘의 효율성을 의료 영상 분할 문제에 적용하여 확인하였다.

Real-Time Detection on FLUSH+RELOAD Attack Using Performance Counter Monitor (Performance Counter Monitor를 이용한 FLUSH+RELOAD 공격 실시간 탐지 기법)

  • Cho, Jonghyeon;Kim, Taehyun;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.151-158
    • /
    • 2019
  • FLUSH+RELOAD attack exposes the most serious security threat among cache side channel attacks due to its high resolution and low noise. This attack is exploited by a variety of malicious programs that attempt to leak sensitive information. In order to prevent such information leakage, it is necessary to detect FLUSH+RELOAD attack in real time. In this paper, we propose a novel run-time detection technique for FLUSH+RELOAD attack by utilizing PCM (Performance Counter Monitor) of processors. For this, we conducted four kinds of experiments to observe the variation of each counter value of PCM during the execution of the attack. As a result, we found that it is possible to detect the attack by exploiting three kinds of important factors. Then, we constructed a detection algorithm based on the experimental results. Our algorithm utilizes machine learning techniques including a logistic regression and ANN(Artificial Neural Network) to learn from different execution environments. Evaluation shows that the algorithm successfully detects all kinds of attacks with relatively low false rate.

Dynamical Polynomial Regression Prefetcher for DRAM-PCM Hybrid Main Memory (DRAM-PCM 하이브리드 메인 메모리에 대한 동적 다항식 회귀 프리페처)

  • Zhang, Mengzhao;Kim, Jung-Geun;Kim, Shin-Dug
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.20-23
    • /
    • 2020
  • This research is to design an effective prefetching method required for DRAM-PCM hybrid main memory systems especially used for big data applications and massive-scale computing environment. Conventional prefetchers perform well with regular memory access patterns. However, workloads such as graph processing show extremely irregular memory access characteristics and thus could not be prefetched accurately. Therefore, this research proposes an efficient dynamical prefetching algorithm based on the regression method. We have designed an intelligent prefetch engine that can identify the characteristics of the memory access sequences. It can perform regular, linear regression or polynomial regression predictive analysis based on the memory access sequences' characteristics, and dynamically determine the number of pages required for prefetching. Besides, we also present a DRAM-PCM hybrid memory structure, which can reduce the energy cost and solve the conventional DRAM memory system's thermal problem. Experiment result shows that the performance has increased by 40%, compared with the conventional DRAM memory structure.

An Extension of Possibilistic Fuzzy C-means using Regularization (Regularization을 이용한 Possibilistic Fuzzy C-means의 확장)

  • Heo, Gyeong-Yong;NamKoong, Young-Hwan;Kim, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.43-50
    • /
    • 2010
  • Fuzzy c-means (FCM) and possibilistic c-means (PCM) are the two most well-known clustering algorithms in fuzzy clustering area, and have been applied in many applications in their original or modified forms. However, FCM's noise sensitivity problem and PCM's overlapping cluster problem are also well known. Recently there have been several attempts to combine both of them to mitigate the problems and possibilistic fuzzy c-means (PFCM) showed promising results. In this paper, we proposed a modified PFCM using regularization to reduce noise sensitivity in PFCM further. Regularization is a well-known technique to make a solution space smooth and an algorithm noise insensitive. The proposed algorithm, PFCM with regularization (PFCM-R), can take advantage of regularization and further reduce the effect of noise. Experimental results are given and show that the proposed method is better than the existing methods in noisy conditions.

Audio Signal Coding Using Wavelet Transform (웨이블렛 변환을 이용한 오디오 코딩)

  • Bae, Seok-Mo;Kim, Do-Hyoung;Chung, Jae-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.4
    • /
    • pp.64-70
    • /
    • 1997
  • This paper is aimed to propose a new wavelet audio signal coding scheme which reduces the complexity of well-known MPEG(Moving Picture Expert Group)-Audio. The filters of MPEG0audio apply subband technique on the 16-bits PCM audio to aquire bitstream of subband sample using dynamic bit allocation. If we use the wavelet coefficients instead of subband samples and 6 bands which is less than 32 bands of MPEG-audio, the complexity can be reduced. A new audio signal compression algorithm in this paper is based on wavelet transform and the proposed algorithm is compared with MPEG-audio. At the bitrate of 256kbps, the proposed algorithm maintains the CD(Compact-disc) quality. We were able to reduce the about 40% of complexity at encoder and about 70% at decoder.

  • PDF

Adaptive Control of Peak Current Mode Controlled Boost Converter Supplied by Fuel Cell

  • Bjazic, Toni;Ban, Zeljko;Peric, Nedjeljko
    • Journal of Power Electronics
    • /
    • v.13 no.1
    • /
    • pp.122-138
    • /
    • 2013
  • Adaptive control of a peak current mode controlled (PCM) boost converter supplied by a PEM fuel cell is described in this paper. The adaptive controller with reference model and signal adaptation is developed in order to compensate the deviation of the response during the change of the operating point. The procedure for determining the adaptive algorithm's weighting coefficients, based on a combination of the pole-zero placement method and an optimization method is proposed. After applying the proposed procedure, the optimal adaptive algorithm's weighting coefficients can be determined in just a few iterations, without the use of a computer, thus greatly facilitating the application of the algorithm in real systems. Simulation and experimental results show that the dynamic behavior of a highly nonlinear control system with a fuel cell and a PCM boost converter, can fairly accurately be described by the dynamic behavior of the reference model, i.e., a linear system with constant parameters.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.