• Title/Summary/Keyword: data recovery

Search Result 2,280, Processing Time 0.036 seconds

An adaptive clock recovery utilizing data buffer filling rate (수신 데이타의 버퍼 점유률을 이용한 적응클럭 복원)

  • 이종형;김태균
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.3
    • /
    • pp.47-54
    • /
    • 1996
  • In this paper we propose a new timing recovery method by means of utilizing service data filling rate instead of timing information of transmitter. A proposed algorithm controls the phase locked loop in the opposite direction ot data filling rate of FIFO in receiver, and it is based on the fact that average of cell jitters is zero. The proposed method is simple compared with timing information method of transmitter. It can be utilized for timing recovery in synchronous digital hierarchy as well as in plesiochronous digial hierarchy without common reference clocks in end-to-end erminals. We implement the interactive video communication system and test the proposed algorithm. As a result, we hav econfirmed that it yields good perfomrnces in terms of jitters characteristics and hardware complexity.

  • PDF

A Study on a New Carrier Recovery Algorithm for Coherent Burst-mode Communication Systems (동기식 버스트 통신시스템 적용을 위한 새로운 반송파 동기 기법에 관한 연구)

  • Park, Sung-Bok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1043-1048
    • /
    • 2011
  • In this paper, a newsynchronization technique applied to burst-mode communication is proposed. A synchronization technique is to estimate carrier frequency and phase offsets in a noisy channel environment. A fundamental problem for estimating the parameters(carrier phase and frequency offsets) in burst-mode transmission is that the ways of pursuing estimation accuracy and transmission efficiency are always trade-off. To solve this problem, a new carrier recovery technique is proposed to improve the transmission efficiency with reliable performance especially at low S/N. In the proposed technique, the synchronization parameters are first estimated based on a data-aided feed-forward estimation scheme. Then, a phase tracker using decision-directed DPLL estimates the phase offset for the data portion of the burst data. From simulation results, it shows fast synchronization with shorter preamble maintaining reasonable BER performance at low S/N.

2X Converse Oversampling 1.65Gb/s/ch CMOS Semi-digital Data Recovery (2X Converse Oversampling 1.65Gb/s/ch CMOS 준 디지털 데이터 복원 회로)

  • Kim, Gil-Su;Kim, Kyu-Young;Shon, Kwan-Su;Kim, Soo-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.6 s.360
    • /
    • pp.1-7
    • /
    • 2007
  • This paper proposes CMOS semi-digital data recovery with 2X converse oversampling to reduce power consumption and chid area of high definition multimedia interface (HDMI) receivers. Proposed recovery can reduce its power and the effective area by using nt converse oversampling algorithm and semi-digital architecture. Proposed circuit is fabricated using 0.18um CMOS process and measured results demonstrated the power consumption of 14.4mW, the effective area of $0.152mm^2$ and the jitter tolerance of 0.7UIpp with 1.8V supply voltage.)

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

A Study on the Estimation of Remaining Fisheries Damages Considering the Recovery Periods of Fisheries Resource after the Completion of Undertaking Yeongsan River Project (영산강 살리기 사업 이후의 자원회복기간을 고려한 잔존어업피해추정에 관한 연구)

  • Choo, Hyun-Gi;Jo, Mun-Kwan;Kim, Ki-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.51 no.4
    • /
    • pp.1-18
    • /
    • 2020
  • The paper aims to explore existence and degree of remaining fisheries damages after the completion of undertaking the Four Major Rivers Project focusing on the case of Yeongsan river. The paper seeks to show the necessity of consideration of periods of fishery resources recovery in the estimation of ex-post fisheries damages of the project by inferring the analysis of the annual variation of environmental indicators in the river. Therefore, the paper suggests three years of remaining periods of fisheries damages of the project utilizing the variation trend of ex-ante and ex-post annual output data of inland fisheries in Jeonnam province and individual catch of fisheries. In the measurement of the annual degree of fisheries damages during periods of fishery resources recovery, the paper attempts to suggest the method of comparision of day catch data per vessel between ex-ante and ex-post periods of the project, which were investigated by the same institute. Here the paper tries to make correction of ex-post catch data for holding the same catching condition as ex-ante situation by adopting the concept of competitive intensity of catching which was derived from the decreasing rate of number of fishing households in the area of Yeongsan river.

Sequential and Selective Recovery Mechanism for Value Misprediction (값 예측 오류를 위한 순차적이고 선택적인 복구 방식)

  • 이상정;전병찬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.67-77
    • /
    • 2004
  • Value prediction is a technique to obtain performance gains by supplying earlier source values of its data dependent instructions using predicted value of a instruction. To fully exploit the potential of value speculation, however, the efficient recovery mechanism is necessary in case of value misprediction. In this paper, we propose a sequential and selective recovery mechanism for value misprediction. It searches data dependency chain of the mispredicted instruction sequentially without pipeline stalls and adverse impact on clock cycle time. In our scheme, only the dependent instructions on the predicted instruction is selectively squashed and reissued in case of value misprediction.

The Effect of Meridian Points Massage Nursing Intervention on the Recovery of Facial Paralysis (안면경락마사지 간호중재가 뇌졸중 환자의 안면마비 회복에 미치는 영향)

  • 이향련;김병은
    • Journal of Korean Academy of Nursing
    • /
    • v.31 no.6
    • /
    • pp.1044-1054
    • /
    • 2001
  • The purpose of this study was to develop on east-west nursing intervention program. This study was conducted to identify the effectiveness of using facial meridian points for massage nursing intervention on the recovery of facial paralysis for 46 patients (22 for experimental group). All had suffered from strokes, and were also admitted to the division of oriental medicine in K University Hospital. Method: Data was collected from February 1st to December 31st of 2000. This study used a quasi experimental, non-equivalent control group pre-test and post-test design. The recovery of facial paralysis was measured by the difference between left and right facial length, observation and self report on a seven point scale, and facial discomfort by a facial scale after 6-7 facial massages in a two week period. Data was analyzed using the SPSS package program with x2 and t test. Result: The result of this study are as follows; The experimental group who received the facial meridian massage showed higher scores in recovery of facial paralysis (t=2.72, p=.009), and a smaller difference between left and right facial strength than those in control group (t=2.26, p= .29). The discomfort of the facial area in the experimental and control group showed no significant differences. Conclusion: These findings indicate that a facial meridian points massage could be an effective nursing intervention to the recovery of facial paralysis. This study contributes in developing an east-west nursing intervention with the oriental meridian theory and western massage therapy.

  • PDF

Majorization-Minimization-Based Sparse Signal Recovery Method Using Prior Support and Amplitude Information for the Estimation of Time-varying Sparse Channels

  • Wang, Chen;Fang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4835-4855
    • /
    • 2018
  • In this paper, we study the sparse signal recovery that uses information of both support and amplitude of the sparse signal. A convergent iterative algorithm for sparse signal recovery is developed using Majorization-Minimization-based Non-convex Optimization (MM-NcO). Furthermore, it is shown that, typically, the sparse signals that are recovered using the proposed iterative algorithm are not globally optimal and the performance of the iterative algorithm depends on the initial point. Therefore, a modified MM-NcO-based iterative algorithm is developed that uses prior information of both support and amplitude of the sparse signal to enhance recovery performance. Finally, the modified MM-NcO-based iterative algorithm is used to estimate the time-varying sparse wireless channels with temporal correlation. The numerical results show that the new algorithm performs better than related algorithms.

IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems

  • Bian, Jianchao;Luo, Shoushan;Li, Wei;Zha, Yaxing;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5058-5077
    • /
    • 2019
  • Traditional regenerating codes are designed to tolerate node failures with optimal bandwidth overhead. However, there are many types of partial failures inside the node, such as latent sector failures. Recently, proposed regenerating codes can also repair intra-node failures with node-level redundancy but incur significant bandwidth and I/O overhead. In this paper, we construct a new scheme of regenerating codes, called IR-RBT codes, which employs intra-node redundancy to tolerate intra-node failures and serve as the help data for other nodes during the repair operation. We propose 2 algorithms for assigning the intra-node redundancy and RBT-Helpers according to the failure probability of each node, which can flexibly adjust the helping relationship between nodes to address changes in the actual situation. We demonstrate that the IR-RBT codes improve the bandwidth and I/O efficiency during intra-node failure repair over traditional regenerating codes but sacrifice the storage efficiency.

Typologies of Healthcare Service Failures and Recovery Strategies (의료 서비스 실패와 회복 유형에 관한 연구)

  • Kim, Sung-Ho;Shin, Hyun-Hee;Choi, Sung-Ho
    • Korea Journal of Hospital Management
    • /
    • v.14 no.1
    • /
    • pp.99-122
    • /
    • 2009
  • In this study, the authors developed typologies of failures and recovery strategies in healthcare services, adopting the research framework of Kelley et al.(1993), Hoffman, et al.(1995), and Forbes et al.(2005). Data were collected form a sample of 559 respondents recruited in several regions of Korea through self-administered questionnaires. Data collection was done at hospitals and clinics respondents were visiting. The study has identified typologies of 21 failures and 10 recovery strategies in health care services. Results shows that "insufficient explanation by doctors" was the most frequent service failure followed by "insincere attitude of administrative employees" and "insincere attitude of nurses. "The type of recovery (compensation) that most of the respondents have received was apology from the healthcare service providers while the recovery that most respondents wanted to receive was sufficient explanation, suggesting that there is a significant gap between what is wanted and what is offered. Implications for healthcare service providers as well as limitations of the current study were discussed. Directions for further research were also suggested.

  • PDF