• Title/Summary/Keyword: adaptive schemes

Search Result 510, Processing Time 0.028 seconds

Hybrid Transactional Memory using Sampling-based Retry Policy in Multi-Core Environment (멀티코어 환경에서 샘플링 기반 재시도 정책을 이용한 하이브리드 트랜잭셔널 메모리)

  • Kang, Moon-Hwan;Jang, Yeon-Woo;Yoon, Min;Chang, Jae-Woo
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.49-61
    • /
    • 2017
  • Transactional Memory (TM) has greatly changed the parallel programming paradigm for transaction processing and is classified into STM, HTM, HyTM according to hardware or software frameworks. However, the existing studies have a problem that they provide static retry policy for all workloads. To solve the problems, we propose an hybrid transactional memory scheme using sampling-based adaptive retry policy in multi-core environment. First, the proposed scheme determines whether to use STM or HTM according to the characteristic of a transaction. Otherwise, it executes HTM and STM concurrently by using a bloom filter. Second, the proposed scheme provides adaptive retry policy for HTM according to the characteristic of transactions in each workload. Finally, through the experimental performance evaluation using STAMP, the proposed scheme shows 10~20% better performance than the existing schemes.

Efficient TTS Database Compression Based on AMR-WB Speech Coder (AMR-WB 음성 부호화기를 이용한 TTS 데이터베이스의 효율적인 압축 기법)

  • Lim, jong-Wook;Kim, Ki-Chul;Kim, Kyeong-Sun;Lee, Hang-Seop;Park, Hae-Young;Kim, Moo-Young
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.3
    • /
    • pp.290-297
    • /
    • 2009
  • This paper presents an improved adaptive multi-rate wideband (AMR-WB) algorithm for the efficient Text-To-Speech (TTS) database compression. The proposed algorithm includes unnecessary common bit-stream (CBS) removal and parameter delta coding combined with speaker-dependent huffman coding to reduce the required bit-rate without any quality degradation. We also propose lossy coding schemes to produce the maximum bit-rate reduction with negligible quality degradation. The proposed lossless algorithm including CBS removal can reduce bit-rate by 12.40% without quality degradation compared with the 12.65 kbps AMR-WB mode. The proposed lossy algorithm can reduce bit-rate by 20.00% with 0.12 PESQ degradation.

Adaptive Power Control Schemes for Interference Mitigation in LTE Femtocell Networks (LTE 기반 펨토셀 네트워크에서 간섭 완화를 위한 적응적 전력 제어 기법)

  • Lee, Sang-Joon;Kim, Seung-Yeon;Lee, Hyong-Woo;Ryu, Seung-Wan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8A
    • /
    • pp.648-660
    • /
    • 2012
  • The low-power, low-cost femtocell network has been proposed not only to alleviate traffic load to the macro base station (eNB) but also to cover the indoor coverage hole problem. However, in the dense femtocell environment where many femtocells are deployed to cover the whole large office building, performance of such femtocell environment can be deteriorated due to severe co-channel interference problem between the eNB and femtocells and among neighboring femtocells. In particular, a macro UE(mUE) located within femtocell coverage may experience severe co-channel interference from surrounding femtocells. Therefore, In this paper, we propose a novel power control schemes to mitigate interference to a mUE under such dense LTE femtocell environment. With proposed femtocell power control schemes, performance of the mUE can be greatly improved in terms of the outage probability and the SINR while maintaining satisfying femtocell performance. Simulation based performance study shows that the proposed power control scheme is able to enhance mUE performance more than 30% than the conventional dense femtocell in terms of the two performance metrics.

Adaptive Power Saving Protocol Based on Traffic Estimation for Wi-Fi Direct Networks (Wi-Fi Direct 망을 위한 부하량 예측 기반의 전력 절감 기법)

  • Yoo, Hongseok;Park, Yang-Woo;Lee, Chae-Soo;Yun, Tae-Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.207-212
    • /
    • 2015
  • Wi-Fi Direct allows battery powered mobile devices to form a wireless ad hoc network. Since one member of the network called Group Owner (GO) takes the role of managing the network, the network lifetime is mainly affected by the energy efficiency of GO. Hence, Wi-Fi Direct defines power saving schemes that allow GO to save the energy by turning off its radio interface during the periods called absence periods. However, the Wi-Fi Direct specification does not specify how to set parameters (denoted by PS parameters) determining the schedule of the absence periods. In this paper, we therefore propose a novel traffic-aware power saving scheme for Wi-Fi Direct networks. In particular, the proposed scheme estimates the application-level traffic load and adaptively tunes the PS parameters according to the estimated value.

Adaptive User Profile for Information Retrieval from the Web

  • Srinil, Phaitoon;Pinngern, Ouen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1986-1989
    • /
    • 2003
  • This paper proposes the information retrieval improvement for the Web using the structure and hyperlinks of HTML documents along with user profile. The method bases on the rationale that terms appearing in different structure of documents may have different significance in identifying the documents. The method partitions the occurrence of terms in a document collection into six classes according to the tags in which particular terms occurred (such as Title, H1-H6 and Anchor). We use genetic algorithm to determine class importance values and expand user query. We also use this value in similarity computation and update user profile. Then a genetic algorithm is used again to select some terms from user profile to expand the original query. Lastly, the search engine uses the expanded query for searching and the results of the search engine are scored by similarity values between each result and the user profile. Vector space model is used and the weighting schemes of traditional information retrieval were extended to include class importance values. The tested results show that precision is up to 81.5%.

  • PDF

A Flooding Scheme Based on Packet Reception Counts for Ad Hoc Networks (애드혹 네트워크에서 패킷 수신 횟수에 기반한 확률적 플러딩 알고리즘)

  • Song, Tae-Kyu;Kang, Jeong-Jin;Ahn, Hyun-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.197-203
    • /
    • 2011
  • Ad-hoc networks do not rely on a preexisting infrastructure such as Access Points(AP) in wireless network infrastructure. Instead each node participates in routing by forwarding data for other nodes. It makes required broadcasting to transmit packets to the whole network. In that part, each node tries to transmit data without any information about the other nodes. Therefore it causes duplication of transmission and waste of power. This paper presents adaptive probabilistic broadcasting schemes based on packet reception counts to alleviate the broadcast storm problem for wireless ad hoc networks. In this algorithm, each node calculates efficiency broadcast probability. Simulation results for the proposed flood algorithm are also presented.

Global Mobility Management Scheme for Seamless Mobile Multicasting Service Support in PMIPv6 Networks

  • Song, Myungseok;Cho, Jun-Dong;Jeong, Jong-Pil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.637-658
    • /
    • 2015
  • The development of multimedia applications has followed the development of high-speed networks. By improving the performance of mobile devices, it is possible to provide high-transfer-speed broadband and seamless mobile multicasting services between indoor and outdoor environments. Multicasting services support efficient group communications. However, mobile multicasting services have two constraints: tunnel convergence and handoff latency. In order to solve these problems, many protocols and handoff methods have been studied. In this paper, we propose inter local mobility anchor (inter-LMA) optimized handoff model for mobile multicasting services in proxy mobility IPv6 based (PMIPv6-based) networks. The proposed model removes the tunnel convergence issue and reduces the router processing costs. Further, it the proposed model allows for the execution of fast handoff operations with adaptive transmission mechanisms. In addition, the proposed scheme exhibits low packet delivery costs and handoff latency in comparison with existing schemes and ensures fast handoff when moving the inter-LMA domain.

Shape Adaptive Searching Technique for Finding Focused Pixels (초점화소 탐색시간의 최소화를 위한 검색영역 결정기법)

  • Choi, Dae-Sung;Song, Pil-Jae;Kim, Hyun-Tae;Hahn, Hern-Soo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.2
    • /
    • pp.151-159
    • /
    • 2002
  • The method of accumulating a sequence of focused images is usually used for reconstruction of 3D object\\`s shape. To acquire a focused image, the conventional methods must calculate the focus measures of all pixels resulting in a long measurement time. This paper proposes a new method of reducing the computation time spent for deciding the focused pixels in the input image, which predicts the area in the image to calculate the focus measure based on a priori information on the object to be measured. The proposed algorithm estimates the area to consider in the next measurement based on the focused area in the present measurement. As the focus measure, Laplacian measure was used in this paper and the experiments have shown that the preposed algorithm may significantly reduce the calculation time. Although, as implied, this algorithm can be applied to only simple objects at this stage, advanced representation schemes will eliminate the restrictions on application domain.

Special Protection and Control Scheme for Transmission Line Overloading Elimination Based on Hybrid Differential Evolution/Electromagnetism-Like Algorithm

  • Hadi, Mahmood Khalid;Othman, Mohammad Lutfi;Wahab, Noor Izzri Abd
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.1729-1742
    • /
    • 2017
  • In designing System Protection Schemes (SPSs) in power systems, protecting transmission network against extreme undesired conditions becomes a significant challenge in mitigating the transmission line overloading. This paper presents an intelligent Special Protection and Control Scheme (SPCS) using of Differential Evolution with Adaptive Mutation (DEAM) approach to obtain the optimum generation rescheduling to solve the transmission line overloading problem in system contingency conditions. DEAM algorithm employs the attraction-repulsion idea that is applied in the electromagnetism-like algorithm to support the mutation process of the conventional Differential Evolution (DE) algorithm. Different N-1 contingency conditions under base and increase load demand are considered in this paper. Simulation results have been compared with those acquired from Genetic Algorithm (GA) application. Minimum severity index has been considered as the objective function. The final results show that the presented DEAM method offers better performance than GA in terms of faster convergence and less generation fuel cost. IEEE 30-bus test system has been used to prove the effectiveness and robustness of the proposed algorithm.

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

  • Kang, Taeho;Li, Xiang;Yu, Chansu;Kim, Jong
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.187-197
    • /
    • 2013
  • Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mechanisms, and watermarked DSSS (WDSSS) schemes. The former has been motivated by the fact that it is still an open question to establish and share the secret spread sequence between the transmitter and the receiver without being noticed by adversaries. The basic idea of the latter is to exploit the redundancy inherent in DSSS's spreading process to embed watermark information. It can be considered a counter measure (authentication) for an intelligent attacker who obtains the spread sequence to generate fake messages. This paper also presents and evaluates an adaptive DSSS scheme that takes both jam resistance and communication efficiency into account.