• Title/Summary/Keyword: data recovery

Search Result 2,294, Processing Time 0.031 seconds

수신 데이타의 버퍼 점유률을 이용한 적응클럭 복원 (An adaptive clock recovery utilizing data buffer filling rate)

  • 이종형;김태균
    • 전자공학회논문지A
    • /
    • 제33A권3호
    • /
    • pp.47-54
    • /
    • 1996
  • In this paper we propose a new timing recovery method by means of utilizing service data filling rate instead of timing information of transmitter. A proposed algorithm controls the phase locked loop in the opposite direction ot data filling rate of FIFO in receiver, and it is based on the fact that average of cell jitters is zero. The proposed method is simple compared with timing information method of transmitter. It can be utilized for timing recovery in synchronous digital hierarchy as well as in plesiochronous digial hierarchy without common reference clocks in end-to-end erminals. We implement the interactive video communication system and test the proposed algorithm. As a result, we hav econfirmed that it yields good perfomrnces in terms of jitters characteristics and hardware complexity.

  • PDF

동기식 버스트 통신시스템 적용을 위한 새로운 반송파 동기 기법에 관한 연구 (A Study on a New Carrier Recovery Algorithm for Coherent Burst-mode Communication Systems)

  • 박성복
    • 한국군사과학기술학회지
    • /
    • 제14권6호
    • /
    • pp.1043-1048
    • /
    • 2011
  • In this paper, a newsynchronization technique applied to burst-mode communication is proposed. A synchronization technique is to estimate carrier frequency and phase offsets in a noisy channel environment. A fundamental problem for estimating the parameters(carrier phase and frequency offsets) in burst-mode transmission is that the ways of pursuing estimation accuracy and transmission efficiency are always trade-off. To solve this problem, a new carrier recovery technique is proposed to improve the transmission efficiency with reliable performance especially at low S/N. In the proposed technique, the synchronization parameters are first estimated based on a data-aided feed-forward estimation scheme. Then, a phase tracker using decision-directed DPLL estimates the phase offset for the data portion of the burst data. From simulation results, it shows fast synchronization with shorter preamble maintaining reasonable BER performance at low S/N.

2X Converse Oversampling 1.65Gb/s/ch CMOS 준 디지털 데이터 복원 회로 (2X Converse Oversampling 1.65Gb/s/ch CMOS Semi-digital Data Recovery)

  • 김길수;김규영;손관수;김수원
    • 대한전자공학회논문지SD
    • /
    • 제44권6호
    • /
    • pp.1-7
    • /
    • 2007
  • 본 논문에서는 고성능 멀티미디어 인터페이스 (High Definition Multimedia Interface: HDMI) 용 수신기의 전력 절감과 면적 감소를 위한 2X converse oversampling 방식의 준 디지털 데이터 복원 회로를 제안한다. 제안하는 데이터 복원 회로는 2X converse oversampling 방식의 데이터 검출 알고리즘과 준 디지털 구조를 이용해 전력과 유효 면적을 효과적으로 감소시킨다. 제안하는 회로의 성능을 검증하기 위해서 0.18um CMOS 공정을 이용하여 칩이 제작되었으며, 측정 결과 14.4mW의 전력을 소모하고, $0.152mm^2$의 유효 면적을 차지하며, 0.7UIpp의 Jitter tolerance 성능을 나타내므로 HDMI용 수신기의 전체 전력과 유효면적을 효과적으로 감소시킬 수 있다.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

영산강 살리기 사업 이후의 자원회복기간을 고려한 잔존어업피해추정에 관한 연구 (A Study on the Estimation of Remaining Fisheries Damages Considering the Recovery Periods of Fisheries Resource after the Completion of Undertaking Yeongsan River Project)

  • 추현기;조문관;김기수
    • 수산경영론집
    • /
    • 제51권4호
    • /
    • pp.1-18
    • /
    • 2020
  • The paper aims to explore existence and degree of remaining fisheries damages after the completion of undertaking the Four Major Rivers Project focusing on the case of Yeongsan river. The paper seeks to show the necessity of consideration of periods of fishery resources recovery in the estimation of ex-post fisheries damages of the project by inferring the analysis of the annual variation of environmental indicators in the river. Therefore, the paper suggests three years of remaining periods of fisheries damages of the project utilizing the variation trend of ex-ante and ex-post annual output data of inland fisheries in Jeonnam province and individual catch of fisheries. In the measurement of the annual degree of fisheries damages during periods of fishery resources recovery, the paper attempts to suggest the method of comparision of day catch data per vessel between ex-ante and ex-post periods of the project, which were investigated by the same institute. Here the paper tries to make correction of ex-post catch data for holding the same catching condition as ex-ante situation by adopting the concept of competitive intensity of catching which was derived from the decreasing rate of number of fishing households in the area of Yeongsan river.

값 예측 오류를 위한 순차적이고 선택적인 복구 방식 (Sequential and Selective Recovery Mechanism for Value Misprediction)

  • 이상정;전병찬
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제31권1_2호
    • /
    • pp.67-77
    • /
    • 2004
  • 고성능 슈퍼스칼라 프로세서에서 값 예측(value prediction) 방식은 명령의 결과 값을 미리 예측하고, 이 후 데이타 종속 관계가 있는 명령들에게 값을 조기에 공급함으로써 이들 명령들을 모험적으로 실행하여 성능을 향상시키는 방식이다. 값 예측으로 성능을 향상시키기 위해서는 예측 실패 시에 효율적으로 복구하는 과정이 필수적이다. 본 논문에서는 값 예측 실패 시에 잘못 예측된 값을 사용하여 모험적으로 수행된 명령들만을 순차적으로 취소하고 복구한 후에 재이슈하는 값 예측 실패 복구 메커니즘(value misprediction recovery mechanism)을 제안한다. 제안된 복구 방식은 한번에 모든 종속명령들을 검색하지 않음으로써 파이프라인을 정지시키지 않는다. 즉, 파이프라인이 진행되는 순서에 따라 순차적으로 값 예측이 틀린 종속명령만을 선택적으로 취소하고 재이슈하여 불필요한 취소와 재이슈를 줄임으로써 값 예측 실패 시에 손실을 줄인다.

안면경락마사지 간호중재가 뇌졸중 환자의 안면마비 회복에 미치는 영향 (The Effect of Meridian Points Massage Nursing Intervention on the Recovery of Facial Paralysis)

  • 이향련;김병은
    • 대한간호학회지
    • /
    • 제31권6호
    • /
    • pp.1044-1054
    • /
    • 2001
  • The purpose of this study was to develop on east-west nursing intervention program. This study was conducted to identify the effectiveness of using facial meridian points for massage nursing intervention on the recovery of facial paralysis for 46 patients (22 for experimental group). All had suffered from strokes, and were also admitted to the division of oriental medicine in K University Hospital. Method: Data was collected from February 1st to December 31st of 2000. This study used a quasi experimental, non-equivalent control group pre-test and post-test design. The recovery of facial paralysis was measured by the difference between left and right facial length, observation and self report on a seven point scale, and facial discomfort by a facial scale after 6-7 facial massages in a two week period. Data was analyzed using the SPSS package program with x2 and t test. Result: The result of this study are as follows; The experimental group who received the facial meridian massage showed higher scores in recovery of facial paralysis (t=2.72, p=.009), and a smaller difference between left and right facial strength than those in control group (t=2.26, p= .29). The discomfort of the facial area in the experimental and control group showed no significant differences. Conclusion: These findings indicate that a facial meridian points massage could be an effective nursing intervention to the recovery of facial paralysis. This study contributes in developing an east-west nursing intervention with the oriental meridian theory and western massage therapy.

  • PDF

Majorization-Minimization-Based Sparse Signal Recovery Method Using Prior Support and Amplitude Information for the Estimation of Time-varying Sparse Channels

  • Wang, Chen;Fang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권10호
    • /
    • pp.4835-4855
    • /
    • 2018
  • In this paper, we study the sparse signal recovery that uses information of both support and amplitude of the sparse signal. A convergent iterative algorithm for sparse signal recovery is developed using Majorization-Minimization-based Non-convex Optimization (MM-NcO). Furthermore, it is shown that, typically, the sparse signals that are recovered using the proposed iterative algorithm are not globally optimal and the performance of the iterative algorithm depends on the initial point. Therefore, a modified MM-NcO-based iterative algorithm is developed that uses prior information of both support and amplitude of the sparse signal to enhance recovery performance. Finally, the modified MM-NcO-based iterative algorithm is used to estimate the time-varying sparse wireless channels with temporal correlation. The numerical results show that the new algorithm performs better than related algorithms.

IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems

  • Bian, Jianchao;Luo, Shoushan;Li, Wei;Zha, Yaxing;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.5058-5077
    • /
    • 2019
  • Traditional regenerating codes are designed to tolerate node failures with optimal bandwidth overhead. However, there are many types of partial failures inside the node, such as latent sector failures. Recently, proposed regenerating codes can also repair intra-node failures with node-level redundancy but incur significant bandwidth and I/O overhead. In this paper, we construct a new scheme of regenerating codes, called IR-RBT codes, which employs intra-node redundancy to tolerate intra-node failures and serve as the help data for other nodes during the repair operation. We propose 2 algorithms for assigning the intra-node redundancy and RBT-Helpers according to the failure probability of each node, which can flexibly adjust the helping relationship between nodes to address changes in the actual situation. We demonstrate that the IR-RBT codes improve the bandwidth and I/O efficiency during intra-node failure repair over traditional regenerating codes but sacrifice the storage efficiency.

의료 서비스 실패와 회복 유형에 관한 연구 (Typologies of Healthcare Service Failures and Recovery Strategies)

  • 김성호;신현희;최성호
    • 한국병원경영학회지
    • /
    • 제14권1호
    • /
    • pp.99-122
    • /
    • 2009
  • In this study, the authors developed typologies of failures and recovery strategies in healthcare services, adopting the research framework of Kelley et al.(1993), Hoffman, et al.(1995), and Forbes et al.(2005). Data were collected form a sample of 559 respondents recruited in several regions of Korea through self-administered questionnaires. Data collection was done at hospitals and clinics respondents were visiting. The study has identified typologies of 21 failures and 10 recovery strategies in health care services. Results shows that "insufficient explanation by doctors" was the most frequent service failure followed by "insincere attitude of administrative employees" and "insincere attitude of nurses. "The type of recovery (compensation) that most of the respondents have received was apology from the healthcare service providers while the recovery that most respondents wanted to receive was sufficient explanation, suggesting that there is a significant gap between what is wanted and what is offered. Implications for healthcare service providers as well as limitations of the current study were discussed. Directions for further research were also suggested.

  • PDF