• Title/Summary/Keyword: Trade-off Mechanism

Search Result 44, Processing Time 0.027 seconds

Production, Assessment and Marketing of Lichens for Economic Upliftment and Livelihood Generation of Rural Communities in Kumaun Himalaya

  • Pant, Girish Chandra
    • Journal of Forest and Environmental Science
    • /
    • v.30 no.3
    • /
    • pp.267-276
    • /
    • 2014
  • Collection of lichen together with tree twigs of oak and other trees bearing abundant growth of lichens is a common practice among the villagers and the rivals residing near Oak forests in Kumaun Himalaya. Nainital forest division represents about Twenty nine percent vegetation of the Oak forest in Kumaun Himalaya. In Kumaun, the lichen trade share is decreasing at an alarming rate of 21.93% which requires immediate actions by the Government. Lichen contributed significantly to household earnings with off-farm activities and this sector was found second highest income creator after Agriculture. It is a source of cash income during the season of extraction, which increases economic access to food. It has been observed in the present study that the secondary collector and transporters together get maximum share (>50%) of income generated from lichen, thus economic exploitation of the poorly educated people by the traders was still prevalent in the area. To improve the socio-economic standard of the people of Kumaun, it may is necessary to increase and improve the lichens resources of the area. There is a strong need for scientific management, best harvesting practices and strict monitoring of resources. The present study was conducted to assess the present and future resource potential for the conservation and sustainable management of lichens, existing market mechanism, role of Lichens in economic upliftment and livelihood generation of rural communities in Kumaun Himalaya.

A Selective Message Synchronization Mechanism for Networked Virtual Environment (네트워크 가상환경에서의 선별적 메시지 동기화 기법)

  • Yun Chung-Ha;Paik Doo-Won
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.208-214
    • /
    • 2006
  • Participants of a NVE(networked virtual environment) may have different hardwares and network environments, and to guarantee the fairness, messages of participants should be synchronized. A solution for the synchronization problem is to wait for a certain amount of time until the server processes the message. It is not easy to determine a suitable waiting period because of the trade-off between the fairness and the responsiveness. In this paper we propose a method to decide a waiting period by considering only the participants with small network delays and perform experiments for the performance evaluation. Experiments show that the proposed method leads to significant improvement of responsiveness, while retaining fairness.

  • PDF

Design of a Channel Estimator for the LTE System Based on the Multirate Signal Processing (다속신호처리 기법을 이용한 LTE 시스템 채널 추정기법 설계)

  • Yoo, Kyung-Yul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.11
    • /
    • pp.2108-2113
    • /
    • 2010
  • The Long Term Evolution (LTE) system is based on the Orthogonal Frequency Division Multiplexing (OFDM) and relies its channel estimation on the lattice-type pilot samples in the multipath fading channel environment. The estimation of the channel frequency response (CFR) makes use of the least squares estimate (LSE) for each pilot samples, followed by an interpolation both in time- and in frequency-domain to fill up the channel estimates for subcarriers corresponding to data samples. Any interpolation scheme could be adopted for this purpose. Depending on the requirements of the target system, we may choose a simple linear interpolation or a sophisticated one. For any choice of an interpolation scheme, these is a trade-off between estimation accuracy and numerical cost. For those wireless communication systems based on the OFDM and the preamble-type pilot structure, the DFT-based channel estimation and its variants have been successfully. Yet, it may not be suitable for the lattice-type pilot structure, since the pilot samples are not sufficient to provide an accurate estimate and it is known to be sensitive to the location as well as the length of the time-domain window. In this paper, we propose a simple interpolated based on the upsampling mechanism in the multirate signal processing. The proposed method provides an excellent alternative to the DFT-based methods in terms of numerical cost and accuracy. The performance of the proposed technique is verified on a multipath environment suggested on a 3GPP LTE specification.

An Efficient Selective Method for Audio Watermarking Against De-synchronization Attacks

  • Mushgil, Baydaa Mohammad;Adnan, Wan Azizun Wan;Al-hadad, Syed Abdul-Rahman;Ahmad, Sharifah Mumtazah Syed
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.476-484
    • /
    • 2018
  • The high capacity audio watermarking algorithms are facing a main challenge in satisfying the robustness against attacks especially on de-synchronization attacks. In this paper, a robust and a high capacity algorithm is proposed using segment selection, Stationary Wavelet Transform (SWT) and the Quantization Index Modulation (QIM) techniques along with new synchronization mechanism. The proposed algorithm provides enhanced trade-off between robustness, imperceptibility, and capacity. The achieved watermarking improves the reliability of the available watermarking methods and shows high robustness towards signal processing (manipulating) attacks especially the de-synchronization attacks such as cropping, jittering, and zero inserting attacks. For imperceptibility evaluation, high signal to noise ratio values of above 22 dB has been achieved. Also subjective test with volunteer listeners shows that the proposed method has high imperceptibility with Subjective Difference Grade (SDG) of 4.76. Meanwhile, high rational capacity up to 176.4 bps is also achieved.

Design Mechanism for Malicious Code Detection with Sandboxes in Dynamic Class Hierarchies (샌드박스의 동적 클래스 계층구조를 통한 악성코드 탐지 기법의 설계)

  • Kim, Chol-Min;Lim, Young-Hwan;Hong, Man-Pyo;Yeh, Hong-Jin;Cho, Eun-Sun;Lee, Chol-Won;Park, Hyun-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.425-428
    • /
    • 2001
  • 알려지지 않은 악성 코드의 수행을 막는 방법으로 프로그램의 실행 환경을 제한하는 '샌드박스' 기법이 많이 쓰여져 왔다. 코드의 비정상 행위를 탐지하는 이 방식은 얼마나 다양한 샌드박스들을 두는가에 따라 적용성(configurability)과 편리성(ease of use) 간의 양면성 (trade-off)을 가진다. 기존의 MAPbox는 이 두 가지를 동시에 만족시키기 위해 프로그램의 종류별로 샌드박스를 두는 클래스별 샌드박스 적용 기법을 사용한다[3]. 그러나, 이 방법은 정적으로 클래스들이 결정되므로 적용성에 한계가 있다. 본 논문에서는 MAPbox의 개념에 동적 클래스 생성 기능을 추가함으로써 적용성을 높이는 기법을 소개하고 실제로 구현한다. MAPbox에 비해 적용성이 높아진 예로 MAPbox에서는 정상행위이지만 비정상행위로 판단되는 경우가 제안된 기법을 통해 올바르게 판단됨을 보인다.

  • PDF

Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection

  • Cho, Choong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2568-2588
    • /
    • 2021
  • Shared mesh protection (SMP) protects traffic against failures occurring in a working path, as with linear protection, and allows resource sharing of protection paths with different endpoints. The SMP mechanism coordinates multiple protection paths that require shared resources when failures occur on multiple working paths. When multiple failures occur in SMP networks sharing limited resources, activation can fail because some of the resources in the protection path are already in use. In this case, a node confirming that a resource is not available has the option to wait until the resource is available or to withdraw activation of the protection path. In this study, we recognize that the protection switching time and the number of protected services can be different, depending on which option is used for SMP networks. Moreover, we propose a detailed design for the implementation of SMP by considering options and algorithms that are commonly needed for network nodes. A simulation shows the performance of an SMP system implemented with the proposed design and utilizing two options. The results demonstrate that resource utilization can be increased or protection switching time can be shortened depending on the option selected by the network administrator.

Conceptual Design and Development Test of an Unmanned Scaled-down Quad Tilt Prop PAV (쿼드 틸트 프롭형 PAV 무인 축소모델 개념설계 및 개발시험)

  • Byun, Young-Seop;Song, Jun-Beom;Kim, Jae-Nam;Jeong, Jin-Suk;Song, Woo-Jin;Kang, Beom-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.1
    • /
    • pp.37-46
    • /
    • 2014
  • This paper describes the conceptual design and development test procedure of a unmanned scaled-down personal air vehicle(PAV) with drive and flight dual mode capability. Trade studies on operational requirements led to the suggestion of a quad tilt prop platform which has nacelle tilt capability with multi rotor configuration. Motors for propeller propulsion and driving mechanism were integrated into a single nacelle, then they were implemented by nacelle tilt mechanism for conversion between the drive and the flight modes. Primary design parameters and initial specifications were confirmed through conceptual design, then functional tests were performed with the test platforms for the drive and the flight modes.

Efficient File System Level Encryption Mechanism Using HSM (HSM을 이용한 효율적인 파일시스템 암호화 메커니즘)

  • Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.849-858
    • /
    • 2013
  • In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.

A Point-based Resource Distribution Scheme and Its Characteristics for Mobile P2P Streaming Service (모바일 P2P 스트리밍 서비스를 위한 포인트 기반 자원 배분 기법과 그 특성)

  • Kim, Yangjung;Chong, Ilyoung;Han, Chimoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.33-42
    • /
    • 2013
  • In the early stage of P2P, the technology was limited to narrow usage of file sharing, but currently, P2P technology has become essential to maximize the efficiency between associated technologies without additional deployment of high costly infrastructure and also the burden of the server. Especially, P2P media streaming service is a highly attractive service to mobile users. which requires a higher quality in the mobile environment in accordance with the development of technology of wired network as well as better mobile terminals. However, P2P technology should consider the trade-off between 'peer selfishness' and QoE for providing fairness. The P2P system also try to maximize the resource utilization through an incentive mechanism for service differentiation and encourage peers to contribute continuously for improving the overall system performance. In this paper, we propose an point-based incentive mechanism based on peer's contribution level and energy availability for service differentiation. We also introduce that the proposed mechanism efficiently enhances the system performance as the peer with incentive using contribution and energy obtains more effective resource distribution.

Performance Improvement of IPMC(Ionic Polymer Metal Composites) for a Flapping Actuator

  • Lee, Soon-Gie;Park, Hoon-Cheol;Pandita Surya D.;Yoo Young-Tai
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.6
    • /
    • pp.748-755
    • /
    • 2006
  • In this paper, a trade-off design and fabrication of IPMC(Ionic Polymer Metal Composites) as an actuator for a flapping device have been described. Experiments for the internal solvent loss of IPMCs have been conducted for various combinations of cation and solvent in order to find out the best combination of cation and solvent for minimal solvent loss and higher actuation force. From the experiments, it was found that IPMCs with heavy water as their solvent could operate longer. Relations between length/thickness and tip force of IPMCs were also quantitatively identified for the actuator design from the tip force measurement of 200, 400, 640, and $800{\mu}m$ thick IPMCs. All IPMCs thicker than $200{\mu}m$ were processed by casting $Nafion^{TM}$ solution. The shorter and thicker IPMCs tended to generate higher actuation force but lower actuation displacement. To improve surface conductivity and to minimize solvent evaporation due to electrically heated electrodes, gold was sputtered on both surfaces of the cast IPMCs by the Physical Vapor Deposition(PVD) process. For amplification of a short IPMC's small actuation displacement to a large flapping motion, a rack-and-pinion type hinge was used in the flapping device. An insect wing was attached to the IPMC flapping mechanism for its flapping test. In this test, the wing flapping device using the $800{\mu}m$ thick IPMC. could create around $10^{\circ}{\sim}85^{\circ}$ flapping angles and $0.5{\sim}15Hz$ flapping frequencies by applying $3{\sim|}4V$.