• Title/Summary/Keyword: Science communication

Search Result 13,130, Processing Time 0.054 seconds

Design and Fabrication of 400MHz ISM-Band GFSK Transceiver for Data Communication (400MHz ISM대역 데이터 통신용 GFSK 송.수신기 설계 및 제작)

  • Lee, Hang-Soo;Jang, Rae-Kyu;Hong, Sung-Yong;Lee, Seung-Min
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2005.11a
    • /
    • pp.401-406
    • /
    • 2005
  • The GFSK Transceiver of 400MHz ISM band for data communication is designed and fabricated. To reduce the occupied bandwidth of transmitted signal, the GFSK modulation is selected. The measured results of fabricated transceiver show the data rate of 2400bps at 8.5kHz bandwidth, frequency deviation of less than $\pm$3kHz, sensitivity of -111dBm, SNR of 21.58dB. The fabricated transceiver is satisfied with the regulation of radio wave and has the good performance. This transceiver is well suited for data communication of 400MHz ISM band.

  • PDF

Enhanced Dynamic Segment Protection in WDM Optical Networks under Reliability Constraints

  • Guo, Lei;Cao, Jin;Yu, Hongfang;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.99-102
    • /
    • 2006
  • In this letter, we study the protection problem in wavelength division multiplexing (WDM) optical networks, and propose a novel dynamic heuristic algorithm called differentiated reliable segment protection (DRSP). Differing from previous work, DRSP can effectively avoid the trap problem and is able to find a feasible solution for each connection request. Therefore, DRSP outperforms the previous work. Simulation results have shown to be promising.

  • PDF

Threshold level analysis of the FFH-MA system using noncoherent FSK modulation under the presence of frequency and timing offsets (주파수와 타이밍 옵셋에 의한 빠른 주파수 호핑 시스템의 임계값 분석)

  • Jeungmin Joo;Yeomin Yoon;Miheung Choe;Lee, Kwangeog;Kim, Kiseon
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.226-229
    • /
    • 2003
  • Under the prsence of the frequency and timing offset, we evaluate the BER performance of the FFH-MA system using noncoherent M-ary FSK modulation in the Rayleigh fading channel. The numerical resuts show that while the frequency and timing offset increases at a given SNR, the BER is severely degraded. The threshold level used in the envelope detector increases with the increase of the frequency and timing offset, and with the proper selection of the threshold level, the BER can be improved under the presence of such offsets.

  • PDF

Relationships among Leadership, Communication and Outcomes in Research Teams

  • Oh, Kyoungjo;Kim, Youngbae;Lee, Jinoo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.17 no.1
    • /
    • pp.135-145
    • /
    • 1992
  • The relationships among leadershipm leader-subordinate interpersonal communication and outcomes in research teams were investigated for six research institutes sponsored by the Korean Government, Consideration and initiating structure of leader behavior were used as leadership dimensions. Subordinate satisfaction with supervision and with work, and project success were considered as outcomes in research team. Leader-subordinate interpersonal communication was positively related to both of consideration and initiating structure of leader behavior. Outcomes in a research team were differently related to the communication according to leadership types. Finally, several theoretical and managerial implications are discussed.

  • PDF

Outage Analysis of CRNs with SC Diversity Over Nakagami-m Fading Environment

  • Zhang, Zongsheng;Wu, Qihui;Zheng, Xueqiang;Wang, Jinlong;Li, Lianbao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3003-3017
    • /
    • 2013
  • In this paper, we investigate the outage performance of a cognitive relay network. We consider mutual interference in an independent, non-identically distributed Nakagmai-m fading environment. We first derive the close-form outage probability expression, which provides an efficient means to evaluate the effects of several parameters. This allows us to study the impact of several parameters on the network's performance. We then derive the asymptotic expression and reveal that the diversity order is strictly determined by the fading severity of the cognitive system. It is not affected by the primary network. Moreover, the primary network only affects the coding gain of the cognitive system. Finally, Monte Carlo simulations are provided, which corroborate the analytical results.

Speedup Technique of FFT based Signal Acquisition at Software-based GNSS Receiver

  • Yuasa, Jun-Ichi;Kondou, Shun-Ichiro;Kubo, Nobuaki;Yasuda, Akio
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.399-403
    • /
    • 2006
  • Software-based GNSS receivers have the great advantage in flexibility compared with conventional receivers. But it has some problems to processing IF level Signal RAW data, need long time to process long term data and TTFF is long because the process is too slow. So this time, we concentrated on the signal acquisition, and examined the speedup technique. Using this technique, the acquisition was speedup dramatically, and signal-to-noise ratio was improved.

  • PDF

Evaluation of Ambiguity Estimator between Reference Stations

  • Gomi, Yasuto;Tominaga, Reiji;Kubo, Nobuaki;Yasuda, Akio
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.57-59
    • /
    • 2006
  • In order to apply the network adjustment, the correct ambiguities between each of reference stations must be calculated. This paper focused on the comparison of ambiguity resolution between the reference stations. Three hours test data with different baseline length from 20 km to 60 km have been analyzed. The results show that the time-to-fix between 20 km and 40 km is typically under 1 minute. However, over 60km baseline, the time-to-fix performance degrades.

  • PDF

Deep Semantic Feature based Deceptive Opinion Spam Analysis (의미 프레임 자질 기반 의견 스팸 분석)

  • Kim, Seong-Soon;Jang, Hyeok-Yoon;Lee, Seong-Woon;Kang, Jaewoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.1001-1004
    • /
    • 2015
  • 소설미디어의 급증과 함께 온라인 리뷰의 의존성이 급증하는 가운데 사용자의 올바른 의사결정을 저해하는 기만적 의견 스팸 이슈가 새롭게 주목받고 있다. 기존의 의견 스팸 연구는 실제 리뷰와 의견 스팸 간의 차이를 어휘, 품사 또는 감정단어와 같은 표면적 자질을 통해 설명하였으나 그들간의 의미적 연결관계는 고려하지 않았다. 본 논문에서는 1) 의미적 프레임 기반의 텍스트 분석기법을 제안하고, 이를 바탕으로 2) 의견 스팸과 실제 리뷰간의 의미적 차이가 있음을 규명하며 3) 새로운 의미적 프레임 자질을 사용하여 기존의 의견 스팸 분류 성능을 향상시킬 수 있음을 보인다.

Adaptive Data Replication Strategy using data access history in DataGrid (데이터 접근 기록 정보를 이용한 적응적 데이터 복제 기법 제안)

  • Sung, GiMun;Lee, DongWoo;Choi, Jihyun;Ramakrishna, R.S.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.937-940
    • /
    • 2004
  • 프로세서 자원, 데이터 저장장치 자원을 제공하면서 가상기관(Virtual Organization)을 구성하는 각 사이트는 사용할 수 있는 네트윅 자원이 한정된 상황에서 애플리케이션 처리량을 극대화하는 최적화된 데이터그리드 시스템을 기대한다. 본 논문에서는 크기가 제한적이며 지리적으로 분산된 데이터 저장공간에서 적응적 데이터 복제 기법을 제안하고 Replica의 지리적 분배를 위한 평가 모델을 제안한다. 이를 위해 논리 시간 데이터 접근 기록 및 통계를 적용하여 복제할 파일들을 구분 하는 이산적 결정 모델을 제안하고 삭제할 Replica 결정에 논리 시간 접근 기록을 적용한다.

  • PDF

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab