• 제목/요약/키워드: Paper Search

검색결과 6,567건 처리시간 0.033초

광대역 다중경로 채널환경에서 W-CDMA 시스템의 셀 탐색과 성능분석 (CELL SEARCH AND PERFORMANCE ANALYSIS OF W-CDMA SYSTEM IN REALISTIC MULTIPATH CHANNEL ENVIRONMENTS)

  • 박대식;김병학;우연식;김철성
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 제14회 신호처리 합동 학술대회 논문집
    • /
    • pp.591-594
    • /
    • 2001
  • In the W-CDMA system, cell search is one of the imporant functions of the mobile station searching for a cell and achieving spreading code and time synchronization to its downlink scrembling code. For the methods of cell search to optimize codes, three stages are considered: 1) slot synchronization, 2) frame synchronization, and 3) scrambling code identification. Channels for cell search are Primary Synchronization Channel (P-SCH), Secondary Synchronization Channel(S-SCH), and Common Pilot Channel (CPICH). In this paper, cell search is analyzed based on simulation. Rake receiver provides improvement of Performance as an increase of bandwidth because there are more available multipaths. In this paper, the performance of W-CDMA system employing RAKE receiver is evaluated by computer simulation over the types of ITU_R wideband channel model and spreading rate. The result shows that the performance of CDMA adapting RAKE receiver is improved by the increase of multipath components in equal level of the received power.

  • PDF

INFORMATION SEARCH BASED ON CONCEPT GRAPH IN WEB

  • Lee, Mal-Rey;Kim, Sang-Geun
    • Journal of applied mathematics & informatics
    • /
    • 제10권1_2호
    • /
    • pp.333-351
    • /
    • 2002
  • This paper introduces a search method based on conceptual graph. A hyperlink information is essential to construct conceptual graph in web. The information is very useful as it provides summary and further linkage to construct conceptual graph that has been provided by human. It also has a property which shows review, relation, hierarchy, generality, and visibility. Using this property, we extracted the keywords of web documents and made up of the conceptual graph among the keywords sampled from web pages. This paper extracts the keywords of web pages using anchor text one out of hyperlink information and makes hyperlink of web pages abstract as the link relation between keywords of each web page. 1 suggest this useful search method providing querying word extension or domain knowledge by conceptual graph of keywords. Domain knowledge was conceptualized knowledged as the conceptual graph. Then it is not listing web documents which is the defect of previous search system. And it gives the index of concept associating with querying word.

P2P 오버레이 네트워크에서 효과적인 Peer 검색을 위한 B-Chord (Effective B-Chord look-up peer in P2P overlay network)

  • 홍록지;문일영
    • 디지털산업정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.1-6
    • /
    • 2011
  • In this paper, search-efficient Bi-directional-Chord(B-Chord) is proposed in P2P (peer-to-Peer) overlay network. Chord is the most popular P2P Look-up protocol. However, it applied to the mobile environment, the search success rate become lower and the request delay time increases. That is big problem. Thus, by improving the existing Chord, in this paper proposed B-Chord reduces the request delay time to in a mobile environment. Proposed B-Chord have the two Finger table and can search by selecting Finger table depending on the value of Key. By use these bi-directional, it can reduce the number of nodes Hop and search delay time. Thus, As a result, it will be able to increase the search success rate in a mobile environment.

의미적 관계를 이용한 OWL 데이터의 키워드 질의 처리 기법 (A Keyword Query Processing Technique of OWL Data using Semantic Relationships)

  • 김연희;김성완
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.59-72
    • /
    • 2013
  • In this paper, we propose a keyword query processing technique based on semantic relationships for OWL data. The proposed keyword query processing technique can improve user's search satisfaction by performing two types of associative search. The first associative search uses information inferred by the relationships between classes or properties during keyword query processing. And it supports to search all information resources that are either directly or indirectly related with query keywords by semantic relationships between information resources. The second associative search returns not only information resources related with query keywords but also values of properties of them. We design a storage schema and index structures to support the proposed technique. And we propose evaluation functions to rank retrieved information resources according to three criteria. Finally, we evaluate the validity and accuracy of the proposed technique through experiments. The proposed technique can be utilized in a variety of fields, such as paper retrieval and multimedia retrieval.

Bus Reconfiguration Strategy Based on Local Minimum Tree Search for the Event Processing of Automated Distribution Substations

  • Ko Yun-Seok
    • KIEE International Transactions on Power Engineering
    • /
    • 제5A권2호
    • /
    • pp.177-185
    • /
    • 2005
  • This paper proposes an expert system that can enhance the accuracy of real-time bus reconfiguration strategy by adopting the local minimum tree search method and that can minimize the spreading effect of the fault by considering the operating condition when a main transformer fault occurs in an automated substation. The local minimum tree search method is used to expand the best-first search method. This method has the advantage that it can improve the solution performance within the limits of the real-time condition. The inference strategy proposed expert system consists of two stages. The first stage determines the switching candidate set by searching possible switching candidates starting from the main transformer or busbar related to the event. The second stage determines the rational real-time bus reconfiguration strategy based on heuristic rules from the obtained switching candidate set. Also, this paper proposes generalized distribution substation modeling using graph theory, and a substation database based on the study results is designed.

탐색 영역의 적응적 이동에 관한 연구 (A Study on Adaptive Moving Method of Search Region)

  • 김진태;이석호;최종수
    • 전자공학회논문지B
    • /
    • 제31B권8호
    • /
    • pp.129-136
    • /
    • 1994
  • In this paper an adaptive moving method of the search region tracking the motion is proposed. The search region in BMA is determined by the capability of hardware implementation and the degree of motion. But once determined nothing can be changed during coding procedure. In this paper we predict the level of motion of the current block using motion vectors of previous frames without overhead information and change the location of the search region according to the level of the motion predicted. In short the proposed method can be archieved the dsirable effect such that the size of search region gets large when the motion is large. Results of experiments show that prediction efficiency has been improved by using adaptive moving method resulting in reduced prediction error in the blocks with large motion.

  • PDF

Rural Postman Problem 해법을 위한 Iterative Local Search 알고리즘 (An Iterative Local Search Algorithm for Rural Postman Problems)

  • 강명주
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.48-53
    • /
    • 2002
  • 본 논문에서는 Rural Postman Problem(RPP) 해법을 위한 Iterative Local Search(ILS) 알고리즘을 제안한다. ILS 알고리즘은 초기해를 여러 번 생성하여 탐색 시작점을 달리하는 방법으로, 초기해의 설정 방법에 따라 알고리즘의 성능이 크게 좌우되는 Local Search(LS) 알고리즘의 단점을 보완할 수 있다. 본 논문에서는 LS 알고리즘과 ILS 알고리즘을 18개의 RPP 문제에 적용하고 그 성능을 분석한다. 실험 결과에서는 ILS 알고리즘이 각각 다른 탐색 시작점에서 해 공간을 탐색함으로서 LS에 비해 좋은 해를 찾을 수 있음을 알 수 있었다.

  • PDF

실직기간 구직활동이 실직자의 재취업에 미치는 영향분석 (The Effects of Job Search Behaviors on Re-employment of the Unemployed in Korea)

  • 이상록
    • 한국사회복지학
    • /
    • 제43권
    • /
    • pp.299-327
    • /
    • 2000
  • Although economic crisis is allaying in Korea, the more effective unempoyment policies are requried in this present. So in this paper, we analyze the effects of relevant factors, especially job search behaviors of the unempyoed on reemployment and look for implications to the improvement of unemployment policies. Major findings are as follows: First, we find that job search behaviors, especially the effectiveness of job search activity and job search attitude are significantly different between the unemployed and the re-employed. Second, we find that the variables of job search behaviors - the effectiveness of job search activity (number of job offers), job search attitude (reservation wage), positive use of job search methods - significantly affect the re-employment of the unemployed from logistic regression analysis results. These findings' implications are as follows: First, the approach based on search theory may be useful in finding out determinants of re-employment. Second, the effects of job search behaviors on the reemployment and their implications should be actively accepted to policy makers in order to improve the effectiveness of un-employment policies. It meams that the effects of job search behaviors must be carefully considered in making or restructuring unemployment policies and their administrations.

  • PDF

A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments

  • Bok, Kyoungsoo;Lim, Jongtae;Ahn, Minje;Yoo, Jaesoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.744-768
    • /
    • 2016
  • As various pieces of information can be provided through the web, schemes that provide search results optimized for individual users are required in consideration of user preference. Since the existing social search schemes use users' profiles, the accuracy of the search deteriorates. They also decrease the reliability of a search result because they do not consider a search time. Therefore, a new social search scheme that considers temporal information as well as popularities and user preferences is required. In this paper, we propose a new mobile social search scheme considering popularities and user preferences based on temporal information. Popularity is calculated by collecting the visiting records of users, while user preference is generated by the actual visiting information among the search results. In order to extract meaningful information from the search target objects that have multiple attributes, a skyline processing method is used, and rank is given to the search results by combining the user preference and the popularity with the skyline processing result. To show the superiority of the proposed scheme, we conduct performance evaluations of the existing scheme and the proposed scheme.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.