• Title/Summary/Keyword: multi-user system

Search Result 1,186, Processing Time 0.032 seconds

Performance Analysis of Optical Hard-Limiter for The Beat Noise in 2-Dimensional OCDMA Receivers (2차원 OCDMA 수신기에서 비트 잡음에 대한 Optical Hard-Limiter의 성능 분석)

  • 김정중;이인성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.485-493
    • /
    • 2004
  • The system performance of 2-Dimensional wavelength hopping/time spreading optical CDMA systems is found to be limited by the occurrence of the beat noise between the components of the signal and the multiple user interference. This paper shows that the performance is analyzed under the beat noise and no beat noise to blow impact of the beat noise. To overcome this problem, the OHL(Optical Hard-Limiter) is used in the receiver. The performance is calculated for a optical CDMA system employing asymmetric and symmetric prime-hop 2-Dimensional codes, respectively The analysis results show that the performance improved 3.5 times of simultaneous users of before and after inserting OHL in the case of no beat noise. In the case of beat noise the performance improved 1.5 times of simultaneous users of before and after inserting OHL. The performance marked use of symmetric prime-hop code.

Color Space Mapping and Medium Access Control Techniques in Visible Light Communication (가시광통신을 위한 색채공간매핑과 MAC 기법 연구)

  • Rahman, Mohammad Shaifur;Kim, Byung-Yeon;Bang, Min-Suk;Park, Young-Il;Kim, Ki-Doo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.99-107
    • /
    • 2009
  • Visible Light Communication (VLC) is a promising wireless communication technology. It offers huge, worldwide available and free bandwidth without electro-magnetic interference, which makes it very attractive for RF-sensitive operating environments. We propose colored LED-based VLC system for hospital use which includes voice recognition system for operating the medical equipments. New Mr hlation Scheme based on the Light Color Space is suggested to overcome the effect of noise generated by background light. Different color space constellations for different symbol sizes are also suggested which would give better bit error rate performance. Finally, Slotted ALOHA or TDMA medium access control protocols are suggested for multi-user operations.

  • PDF

A Study on the Implementation of Register Based VXIbus System (Register Based VXIbus 시스템의 구현에 관한 연구)

  • 노승환;전동근;김성욱;강민호;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.11
    • /
    • pp.1219-1227
    • /
    • 1992
  • VXIbus is a standard for compatibility of instruments of multi-vendors and originated from the VMEbus. The devices for implementing VXIbus system can be categorized into the register based device and the message based device. In this paper we organized the A/D conversion module and the slot0 module, which form the register based VXIbus subsystem. The A/D conversion module is used as a digital voltmeter and LAN is used for communication between an external control computer and the slot0 module. The SCPI(Standard Commands for Programmable Instruments), which is a standard language for instruments, is transmitted from the external control computer to the slot0 module as the ASCII form, and then to the A/D conversion module after changing to the binary digit command. From the experiment. We verified that the measured voltage can be observed on external control computer and user interface can be improved by the modified graphic processing.

  • PDF

(Effective Intrusion Detection Integrating Multiple Measure Models) (다중척도 모델의 결합을 이용한 효과적 인 침입탐지)

  • 한상준;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.397-406
    • /
    • 2003
  • As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, has been raised. In the field of anomaly-based IDS several artificial intelligence techniques such as hidden Markov model (HMM), artificial neural network, statistical techniques and expert systems are used to model network rackets, system call audit data, etc. However, there are undetectable intrusion types for each measure and modeling method because each intrusion type makes anomalies at individual measure. To overcome this drawback of single-measure anomaly detector, this paper proposes a multiple-measure intrusion detection method. We measure normal behavior by systems calls, resource usage and file access events and build up profiles for normal behavior with hidden Markov model, statistical method and rule-base method, which are integrated with a rule-based approach. Experimental results with real data clearly demonstrate the effectiveness of the proposed method that has significantly low false-positive error rate against various types of intrusion.

Developing an AR based Command Post eXercise(CPX) Simulator (증강현실 기반 지휘통제훈련 시뮬레이터 개발)

  • Park, Sangjun;Shin, Kyuyoung;Kim, Dongwook;Kim, Tai Hyo;Roh, Hyo Bin;Lee, Wonwoo
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.53-60
    • /
    • 2018
  • As science and technology develops, it is expected that more precise and various weapons will be used in a much more complicate future battlefield environment. C4I is a system that provides the proper and necessary information to commanders and their staffs to recognize the battlefield situation by connecting and visualizing the complex battlefield environment and various weapon systems together. Commanders and staffs perform battle command training based on a computer or paper map to better utilize the C4I system and Command Post eXercise(CPX) is a process of the training. This is the way for them to improve command control and decision making skills. Analyzing of line of sight(LOS), identifying communication fringe area, deploying troop strength, and determining unit maneuver are highly restricted under the 2D based CPX. In recent years, however, three-dimensional (3D) CPX simulators have been developed to overcome these drawbacks. In response to this trend, this paper proposes a multi-user based CPX simulator using augmented reality (AR) glass, which can be used as a practical war game simulator.

  • PDF

An Intelligent Image Retrieval System using XML (XML을 이용한 지능형 이미지 검색 시스템)

  • 홍성용;나연묵
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.132-144
    • /
    • 2004
  • With the rapid development of internet technology, the number of internet users and the amount of multimedia information on the internet is ever increasing. Recently, the web sites, such as e-business sites and shopping mall sites, deal with lots of image information. As a result, it is required to support content- based image retrieval efficiently on such image data. This paper proposes an intelligent image retrieval system, which adopts XML, technology. To support object-based col)tent retrieval on product catalog images containing multiple objects, we describe a multi -level metadata structure which represents the local features, global features, and semantics of image data. To enable semantic-based and content-based retrieval on such image data, we design a XML-Schema for the proposed metadata and show how to represent such metadata using XML- documents. We also describe how to automatically transform the retrieval results into the forms suitable for the various user environments, such as web browser or mobile browser, using XSLT The proposed scheme can be easily implemented on any commercial platforms supporting XML technology. It can be utilized to enable efficient image metadata sharing between systems, and it will contribute in improving the retrieval correctness and the user's satisfaction on content-based e-catalog image retrieval.

  • PDF

Evaluation of Water Productivity of Thailand and Improvement Measure Proposals

  • Suthidhummajit, Chokchai;Koontanakulvong, Sucharit
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.176-176
    • /
    • 2019
  • Thailand had issued a national strategic development master plan with issues related to water resources and water security in the entire water management. Water resources are an important factor of living and development of the country's socio-economy to be stable, prosperous and sustainable. Therefore, water management in both multidimensional and multi-sectoral systems is important and will supports socio-economic and environmental development. The direction of national development in accordance with the national strategic framework for 20 years that requires the country to level up security level in terms of water, energy and food. To response to the proposed goals, there is a subplan to increase water productivity of the entire water system for economical development use by evaluating use value and to create more value added from water use to meet international standard level. This study aims to evaluate the water productivity of Thailand in each basin and all sectors such as agricultural sector, service and industrial sectors by using the water use data from water account analysis and GDP data from NESDB during the past 10 years (1996-2015). The comparison of water productivity with other countries will also be conducted and in addition, the measures to improve water productivity in next 20 years will be explored to response to the National Strategic Master Plan goals. Water productivity is defined as output per unit of water depleted. The simplest way to compare water productivity across different enterprises is in monetary terms. World Bank presents water productivity as an indication of the efficiency by which each country uses its water resources. There are two data sets used for water productivity analyses, i.e., the first is water use data at end users and the second is Gross Domestic Product. The water use at end users are estimated by water account method based on the System of Environmental-Economic Accounting for Water (SEEA-Water) concept of United Nations. The water account shows the analyses of the water balance between the use and supply of each water resource in physical terms. The water supply and use linkage in the water account analyses separated into each phases, i.e., water sources, water managers, water service providers, water user at end user under water regulators of all kinds of water use activities such as household, industrial, agricultural, tourism, hydropower, and ecological conservation uses. The Gross Domestic Product (GDP), a well- known measuring method of the national economic growth is not actually a comprehensive approach to describe all aspects of national economic status, since GDP does not take into account the costs of the negative impacts to natural resources that result from the overexploitation of development projects, however, at present, integrating the environment with the economy of a country to measure its economic growth with GDP is acceptable worldwide. The study results will show the water use at each basin, use types at end users, water productivity in each sector from 1996-2015 compared with other countries, Besides the productivity improvement measures will be explored and proposed for the National Strategic Master Plan.

  • PDF

The Item Distribution Method for the Party System in the MMORPG Using the Observer Pattern (Observer 패턴을 적용한 MMORPG의 파티 시스템 아이템 배분 방법)

  • Kim, Tai-Suk;Kim, Shin-Hwan;Kim, Jong-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1060-1067
    • /
    • 2007
  • We need various methods to develop MMORPG that is game genre which many users use among various game genre using Internet. Specially, to heighten efficiency of distributing work, Object-oriented language such as C++ is used and we need design techniques that can take advantage of enough object-oriented concept when making large-scale game. There is various pattern that can apply in software breakup design in GoF's design pattern for these design techniques. If you apply Observer pattern to Party System Design for forming community between game users, you can easily add new class and maintain system later. Party Play is one of the important system that is used to form game users' community in MMORPG games. The main point that must be considered in Party-Play-System is to divide evenly experience value and acquisition that is got by Party-Play among users according to each user's level. To implement Party Play System that consider maintenance of system, in this paper, we propose a method using GoF's Observer-Pattern, showing you that proposed method which has advantage to dynamic memory allocation and to virtual method call can be used usefully to change object to real time at program run and to add new class and to maintain system new.

  • PDF

Customized Evacuation Pathfinding through WSN-Based Monitoring in Fire Scenarios (WSN 기반 화재 상황 모니터링을 통한 대피 경로 도출 알고리즘)

  • Yoon, JinYi;Jin, YeonJin;Park, So-Yeon;Lee, HyungJune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1661-1670
    • /
    • 2016
  • In this paper, we present a risk prediction system and customized evacuation pathfinding algorithm in fire scenarios. For the risk prediction, we apply a multi-level clustering mechanism using collected temperature at sensor nodes throughout the network in order to predict the temperature at the time that users actually evacuate. Based on the predicted temperature and its reliability, we suggest an evacuation pathfinding algorithm that finds a suitable evacuation path from a user's current location to the safest exit. Simulation results based on FDS(Fire Dynamics Simulator) of NIST for a wireless sensor network consisting of 47 stationary nodes for 1436.41 seconds show that our proposed prediction system achieves a higher accuracy by a factor of 1.48. Particularly for nodes in the most reliable group, it improves the accuracy by a factor of up to 4.21. Also, the customized evacuation pathfinding based on our prediction algorithm performs closely with that of the ground-truth temperature in terms of the ratio of safe nodes on the selected path, while outperforming the shortest-path evacuation with a factor of up to 12% in terms of a safety measure.

Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient (상관계수를 이용하여 인식률을 향상시킨 rank-level fusion 방법)

  • Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1007-1017
    • /
    • 2019
  • Currently, most biometrics system authenticates users by using single biometric information. This method has many problems such as noise problem, sensitivity to data, spoofing, a limitation of recognition rate. One method to solve this problems is to use multi biometric information. The multi biometric authentication system performs information fusion for each biometric information to generate new information, and then uses the new information to authenticate the user. Among information fusion methods, a score-level fusion method is widely used. However, there is a problem that a normalization operation is required, and even if data is same, the recognition rate varies depending on the normalization method. A rank-level fusion method that does not require normalization is proposed. However, a existing rank-level fusion methods have lower recognition rate than score-level fusion methods. To solve this problem, we propose a rank-level fusion method with higher recognition rate than a score-level fusion method using correlation coefficient. The experiment compares recognition rate of a existing rank-level fusion methods with the recognition rate of proposed method using iris information(CASIA V3) and face information(FERET V1). We also compare with score-level fusion methods. As a result, the recognition rate improve from about 0.3% to 3.3%.