• Title/Summary/Keyword: Secondary Information

Search Result 2,067, Processing Time 0.027 seconds

Compact Catadioptric Wide Imaging with Secondary Planar Mirror

  • Ko, Young-Jun;Yi, Soo-Yeong
    • Current Optics and Photonics
    • /
    • v.3 no.4
    • /
    • pp.329-335
    • /
    • 2019
  • Wide FOV imaging systems are important for acquiring rich visual information. A conventional catadioptric imaging system deploys a camera in front of a curved mirror to acquire a wide FOV image. This is a cumbersome setup and causes unnecessary occlusions in the acquired image. In order to reduce both the burden of the camera deployment and the occlusions in the images, this study uses a secondary planar mirror in the catadioptric imaging system. A compact design of the catadioptric imaging system and a condition for the position of the secondary planar mirror to satisfy the central imaging are presented. The image acquisition model of the catadioptric imaging system with a secondary planar mirror is discussed based on the principles of geometric optics in this study. As a backward mapping, the acquired image is restored to a distortion-free image in the experiments.

An Active Interference Management Scheme for Cognitive Radio Systems (인지 라디오 시스템에서의 능동적인 간섭 관리 기법)

  • Seo, Jongpil;Yang, Chamsol;Park, Gunwoo;Chung, Jaehak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.10
    • /
    • pp.843-850
    • /
    • 2013
  • Cognitive radio systems have been considered as a strong solution of frequency scarcity due to the limit of frequency resources. This paper proposed an active interference management scheme that the secondary system can coexist with the primary system in the same frequency band without interference. Using the proposed protocol, the secondary user acquires interference channel information and transmit/receive filter information and designs precoding matrix using these information. Since interference from the secondary systems are collected to unused subchannels of the primary system, the primary system can suppress interference without additional process. The secondary systems suppress interference from the primary system using whitening matched filter so that the spectral efficiency can be improved. Numerical results provides that the proposed scheme improves performance of the secondary systems without interference to the primary system and do not degrade performance of the primary system even if the number of the secondary systems increases.

The Study of High Speed Charging Algorithm for Secondary Pack Battery (이차 팩 전지를 위한 급속 충전 알고리즘에 관한 연구)

  • Lee, Hyeon-Hee;Lee, Young-Seok;Yeo, Un-Jin;Whang, Sang-Moon;Kim, Seong-Gon;Chin, Dal-Bok
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2649-2652
    • /
    • 2002
  • In this paper, a high speed charging algorithm that charges secondary pack battery within 40 minutes is implementation. Proposed algorithm is that suppling 4 stage pulse instead of constant voltage or current. That makes charge time short, temperature low, and extends battery life. Experimental results show that secondary pack battery is charged within 40 minutes and achieved life time about 2000 cycle.

  • PDF

Availability and Utilizations of Library Information Resources in Secondary Schools by Special Patrons

  • Asuata, Isibhakhome Eleaena;Emasealu, Helen Uzoezi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.1
    • /
    • pp.35-47
    • /
    • 2022
  • This study adopted the descriptive survey research method. The population of this study comprised of the hearing impaired students in selected government secondary schools in Rivers state. The population of hearing impaired students in Rivers State is 257. A simple random sampling technique was used to select a sample size of 159. A self-developed instrument titled "Availability and Utilization of Library Information Resources Questionnaire (AULIRQ)" was utilized for data collection. 153 responses were collated, indicating a 96.2% response rate. The data collected was arranged and analyzed using frequency count, percentages, and mean and standard deviation. Finding reveals that information resources in the libraries understudied were inadequate and under-utilized. Also, it was established that among other barriers, under-funding is a major barrier to making information resources available for the physically challenged. It was recommended that schools offering special education for the hearing impaired should pace up in their developmental gap by providing such resources and ensure adequate funding by all stakeholders.

Architectures of Convolutional Neural Networks for the Prediction of Protein Secondary Structures (단백질 이차 구조 예측을 위한 합성곱 신경망의 구조)

  • Chi, Sang-Mun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.728-733
    • /
    • 2018
  • Deep learning has been actively studied for predicting protein secondary structure based only on the sequence information of the amino acids constituting the protein. In this paper, we compared the performances of the convolutional neural networks of various structures to predict the protein secondary structure. To investigate the optimal depth of the layer of neural network for the prediction of protein secondary structure, the performance according to the number of layers was investigated. We also applied the structure of GoogLeNet and ResNet which constitute building blocks of many image classification methods. These methods extract various features from input data, and smooth the gradient transmission in the learning process even using the deep layer. These architectures of convolutional neural networks were modified to suit the characteristics of protein data to improve performance.

Reading education in secondary schools (중. 고등학교에 있어서 독서교육)

  • 변우열
    • Journal of Korean Library and Information Science Society
    • /
    • v.14
    • /
    • pp.181-215
    • /
    • 1987
  • Reading education is very important in order to promote the refinement, cultivate the emotion and complete the character to the secondary school students. This thesis deals with the establishment of reading education as a formal course in secondary schools, responsibility of teaching and problems related to recommended reading lists. Reading education must separate from the national language education because of literature centered education in reading education. If reading education was separated from the national language education, students can a n.0, pproach to the other cultural boundary besides other own and exchange their information and ideas. So, reading education must be included to the elective subjects in a independent course or become a compulsory subject in secondary school curriculum. The teacher of reading education must become the teacher librarian who has a firm faith and an intellectual accomplishment. But, teacher-librarian has much disadvantages such as the problems of promotion, the division of qualification between elementary school and secondary school, and a short-term training courses for teacher-librarian. Hence, theses problems music be solved in national administrative level. Recommended reading lists must be provided to the student in order to prevent confusion of the sense of value, to estimate their own reading ability by themselves and to establish life long reading plan. Therefore, both Korean Library Association and the Ministry of Education should re-examine and develop recommended reading lists. Finally, problems of a juvenile delinquency in the post industrial society have to be solved through reading education. To solve the juvenile delinquency problems, adolescents should cultivate their moral character and possesses abundant knowledge through reading education. Then, young adults will grow as sound citizen in the society.

  • PDF

Exploitation of Spatial Diversity in a Novel Cooperative Spectrum Sharing Method based on PAM and Modified PAM Modulation

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.280-292
    • /
    • 2014
  • This article presents a novel cooperative spectrum sharing (CSS) scheme. The primary transmitter transmits a complex Quadrature amplitude modulation (QAM) signal in the first phase, and CSS occurs in the second phase. The secondary transmitter with the largest forwarding channel gain among the nodes that successfully decode the primary signal in the first phase is selected for CSS. This selected node employs a pulse-amplitude modulation (PAM) signal for primary information message (IM) instead of the QAM signal, and it employs a modified PAM signal for the secondary IM. The proposed modified PAM signal depends on the amplitude of the primary PAM signal. This method results in no mutual interference and negligible primary interference constraint and allows a higher degree of exploitation of spatial diversity, thus enabling increase in secondary power to improve primary transmission. The outage performance is enhanced in both the primary and secondary systems. The critical region, in which the primary outage performance is enhanced with the proposed CSS scheme, can be adjusted and widened by varying either the modulation cooperation sharing factor or the number of secondary transmitters.

Secrecy Performances of Multicast Underlay Cognitive Protocols with Partial Relay Selection and without Eavesdropper's Information

  • Duy, Tran Trung;Son, Pham Ngoc
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4623-4643
    • /
    • 2015
  • This paper considers physical-layer security protocols in multicast cognitive radio (CR) networks. In particular, we propose dual-hop cooperative decode-and-forward (DF) and randomize-and-forward (RF) schemes using partial relay selection method to enhance secrecy performance for secondary networks. In the DF protocol, the secondary relay would use same codebook with the secondary source to forward the source's signals to the secondary destination. Hence, the secondary eavesdropper can employ either maximal-ratio combining (MRC) or selection combining (SC) to combine signals received from the source and the selected relay. In RF protocol, different codebooks are used by the source and the relay to forward the source message secretly. For each scheme, we derive exact and asymptotic closed-form expressions of secrecy outage probability (SOP), non-zero secrecy capacity probability (NzSCP) in both independent and identically distributed (i.i.d.) and independent but non-identically distributed (i.n.i.d.) networks. Moreover, we also give a unified formula in an integral form for average secrecy capacity (ASC). Finally, our derivations are then validated by Monte-Carlo simulations.

Protein Backbone Torsion Angle-Based Structure Comparison and Secondary Structure Database Web Server

  • Jung, Sunghoon;Bae, Se-Eun;Ahn, Insung;Son, Hyeon S.
    • Genomics & Informatics
    • /
    • v.11 no.3
    • /
    • pp.155-160
    • /
    • 2013
  • Structural information has been a major concern for biological and pharmaceutical studies for its intimate relationship to the function of a protein. Three-dimensional representation of the positions of protein atoms is utilized among many structural information repositories that have been published. The reliability of the torsional system, which represents the native processes of structural change in the structural analysis, was partially proven with previous structural alignment studies. Here, a web server providing structural information and analysis based on the backbone torsional representation of a protein structure is newly introduced. The web server offers functions of secondary structure database search, secondary structure calculation, and pair-wise protein structure comparison, based on a backbone torsion angle representation system. Application of the implementation in pair-wise structural alignment showed highly accurate results. The information derived from this web server might be further utilized in the field of ab initio protein structure modeling or protein homology-related analyses.

Minimum BER Power Allocation for OFDM-based Cognitive Radio Networks

  • Xu, Ding;Li, Qun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2338-2353
    • /
    • 2015
  • In this paper, the optimal power allocation algorithm that minimizes the aggregate bit error rate (BER) of the secondary user (SU) in a downlink orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) system, while subjecting to the interference power constraint and the transmit power constraint, is investigated under the assumption that the instantaneous channel state information (CSI) of the interference links between the secondary transmitter and the primary receiver, and between the primary transmitter and the secondary receiver is perfectly known. Besides, a suboptimal algorithm with less complexity is also proposed. In order to deal with more practical situations, we further assume that only the channel distribution information (CDI) of the interference links is available and propose heuristic power allocation algorithms based on bisection search method to minimize the aggregate BER under the interference outage constraint and the transmit power constraint. Simulation results are presented to verify the effectiveness of the proposed algorithms.