• Title/Summary/Keyword: path generation

Search Result 829, Processing Time 0.023 seconds

Performance of Wireless Network for Multimedia Services in MIMO Partial Band Channel (MIMO 부분간섭 채널에서 멀티미디어 서비스를 위한 무선 네트워크의 성능)

  • Roh Jae-Sung;Cho Sung-Joon;Kim Chun-Gil
    • Journal of Digital Contents Society
    • /
    • v.6 no.3
    • /
    • pp.137-142
    • /
    • 2005
  • CDMA scheme has received a great deal of attenttion as a multiple-access method for future mobile networks. Its main advantage: are higher radio capacity and the capacity of flexible data tranmission. And CDMA scheme is a key technology in the proposals submitted to the ITU on next generation multimedia system with integrated services, namely real-time voice services and non real-time data services. In this paper, capacity evaluation of multiple-input multiple-output(MIMO) Multi-Carrier(MC)/CDMA system is considered to mitigate multiple access interference, partial-band interference and enhance system channel capacity in wireless channel. Recently, to increase the spectrum efficiency and the link reliability, MIMO-MC/CDMA scheme is devised to exploit multi-path in a scattering wireless channel. In particular, the channel capacity of MIMO-MC/CDMA system is evaluated according to Eb/No. Mc, p and B. From the results, in order to inappropriate spacing and the signals are frequency overlapped by partial band interference, the channel capacity of MIMO-MC/CDMA system becomes substantially smaller.

  • PDF

Video Streaming Receiver with Video Information File to correct Wrong Token Bucket Parameters by Packet Loss (패킷 손실에 의해 잘못된 토큰 버킷 파라메타를 정정하는 비디오 정보 파일을 가진 비디오 스트리밍 수신기)

  • Lee, Hyun-No;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.181-188
    • /
    • 2016
  • Video streaming traffics which are arrived in receiver have irregular traffic patterns by many problems over the network path. Particularly, if these received traffics enter into replay buffer without any operation, the overflow and underflow effects are made according to the buffer status. There was an existing scheme which automatically set up token bucket parameters using the video information file under the assumption of the lossless packet on network. The existing scheme has a problem which can set up the wrong token bucket parameters by the lost packets on the practical networks with video packet loss. Therefore, this paper proposes a new scheme which reset up video file information to correct the wrong token bucket parameters in case of packet loss in practical networks with packet loss. Through the simulation, it was found that the proposed scheme would have better performance than the existing scheme in terms of overflow generation and packet loss.

Low-Power FFT Design for NC-OFDM in Cognitive Radio Systems (Cognitive Radio 시스템의 NC-OFDM을 위한 저전력 FFT 설계)

  • Jang, In-Gul;Chung, Jin-Gyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.28-33
    • /
    • 2011
  • Recently, the investigation of the cognitive radio (CR) system is actively progressed as one of the methods for using the frequency resources more efficiently. In CR systems, when the frequency band allocated to the incumbent user is not used, the unused frequency band is assigned to the secondary user. Thus, the FFT input signals corresponding to the actually used frequency band by the incumbent user are assigned as '0'. In this paper, based on the fact that there are many '0' input signals in CR systems, a low-power FFT design method for NC-OFDM is proposed. An efficient zero flag generation technique for each stage is first presented. Then, to increase the utility of the zero flag signals, modified architectures for memory and arithmetic circuits are presented. To verify the performance of the proposed algorithm, 2048 point FFT with radix-24SDFstructureisdesignedusingVerilog HDL. The simulation results show that the power consumption of FFT is reduced considerably by the proposed algorithm.

Development of DC-DC Converter for Arc Welding Machines using A Novel Half Bridge Soft Switching PWM Inverter (새로운 하프 브리지 소프트 스위칭 PWM 인버터를 이용한 용접기용 DC-DC 컨버터의 개발)

  • Kwon, Soon-Kurl;Mun, Sang-Pil
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.4
    • /
    • pp.60-67
    • /
    • 2008
  • This paper presents a new full-bridge soft switching PWM DC-DC converter circuit topology that adding two switcher, two lossless snubber quasi-resonance capacity, two diode to power source for general welding machine. This half bridge soft switching Is low voltage hight current output that first coil current is smaller than second coil current in high frequency transformer can be obtained with decreasing path loss in conventional DC bus line switcher. As it operate ZCS/ZVS in full range, high frequency, high efficiency and high output are implemented at low voltage and high DC current switching power supplies. All of this items are got from simulation and the result of experiment. If make up for the weak points of this proposed circuit, it will be used more easily for next generation TIG, MIG and MAG type of arc-welding machine.

Workspace Generation and Interference Optimization Algorithm by Work-type using 3D Model Object in a Construction Project (건설프로젝트의 작업유형별 3차원 작업공간 생성 및 간섭 최적화 방안)

  • Kim, HyeonSeung;Moon, HyounSeok;Kim, ChangHak;Kang, LeenSeok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.6
    • /
    • pp.1911-1918
    • /
    • 2014
  • The increase of input resources, such as labor and equipment, in a construction project causes workspace interference between activities and it influences on the productivity and quality of construction activities. To solve this problem, many studies related to the workspace interference have been performed, however they verified the workspace concerning with only the geometric location of activities or generated the shape of workspace by a whole object concept not separated units of detailed operations. It is difficult for project manager to reasonably analyze the workspace conflict, because the size of workspace cannot reflect the characteristics of an activity and input time of a resource. This paper presents a methodology that can generate three-dimensional models in order to optimize the workspace shape and size by considering with the characteristics of each activity and input time of each resource. The suggested method can be used for the active BIM system that optimizes the workspace conflict without additional construction duration and for the searching algorithm of optimized moving path for construction equipment.

Multicast using Label Aggregation in MPLS Environment (MPLS환경에서의 Label Aggregation을 통한 Multicast 지원 방안)

  • Park, Pong-Min;Kim, Gyeong-Mok;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.9-16
    • /
    • 2005
  • The growth of the Internet over the last several years has placed a tremendous strain on the high bandwidth Hence, the amount of internet traffic has risen sharply and it has demanded to use the limited resource. MPLS (Multiprotocol Label Switching) is regarded as a core technology for migrating to the next generation Internet. It is important to reduce the number of labels and LSP(Label Switched Path)s for network resource management. In this thesis, we considered an MPLS multicast mechanism in the current Internet. The scalability problem due to lack of labels and multicast property is one of the serious problems in MPLS multicast mechanism, we proposed a Label Aggregation algorithm that the multicast packets on same link in MPLS allocates the same label for the scalability problem. In order to support the proposed algorithm we defined a new LDP(Label Distribution Protocol) multicast field and multicast packet is copied and transmitted for multicast group links of next node in LSR(label Switch Router).

The automatic generation of MPTCP session keys using ECDH (MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구)

  • Sun, Seol-hee;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1912-1918
    • /
    • 2016
  • MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP exchanges a key when initiating an connection and makes a token by using this key for authentication. However the original MPTCP is vulnerable to MITM(Man In The Middle) attacks because the key is transported in clear text. Therefore, we applied a ECDH(Elliptic Curve Diffie-Hellman) key exchange algorithm to original MPTCP and replaced the original key to the ECDH public key. And, by generating the secret key after the public key exchanges, only two hosts is able to make the token using the secret key to add new subflow. Also, we designed and implemented a method supporting encryption and decryption of data using a shared secret key to apply confidentiality to original MPTCP.

Investigating the Relationship of Sustainability Factors with Project Management Success

  • Khalilzadeh, Mohammad;Akbari, Hassan;Foroughi, Amin
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.4
    • /
    • pp.345-353
    • /
    • 2016
  • One of the main concerns of the present age, is attending to the issue of sustainability that in recent decades, the concept of it has grown in terms of recognition and importance. Sustainability have defined further the development of the welfare and living standards of the present generation, without the lives of future generations is at stake. One of these tasks of the business is project management and today, "green or sustainable project management" as one of the most important global trends of project management have been identified. The issue of present study was to investigate the relationship of sustainability factors with success of a project. The population of the research consists of directors of oil and gas in the South Pars region including 150 people that according to Cochran formula, the number of samples were obtained 108 people. In this study, data collection was conducted based on a structured questionnaire that from a sample set of questions was used for sustainability impact on 6 scale of project management success. For this purpose, the whole five-item Likert has been used. Also for statistical analysis, PLS software was used. The results of path analysis at confidence level of 95%, showed a significant relationship exists between "sustainability factor" and "project success criteria." Since the correlation coefficient is positive, so this type of relationship is positive. Thus all the hypotheses at confidence level of 95 percent was confirmed and it became clear that there is a significant positive relationship between "sustainability factors" and "project success criteria."

An Area-efficient Design of SHA-256 Hash Processor for IoT Security (IoT 보안을 위한 SHA-256 해시 프로세서의 면적 효율적인 설계)

  • Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.109-116
    • /
    • 2018
  • This paper describes an area-efficient design of SHA-256 hash function that is widely used in various security protocols including digital signature, authentication code, key generation. The SHA-256 hash processor includes a padder block for padding and parsing input message, so that it can operate without software for preprocessing. Round function was designed with a 16-bit data-path that processed 64 round computations in 128 clock cycles, resulting in an optimized area per throughput (APT) performance as well as small area implementation. The SHA-256 hash processor was verified by FPGA implementation using Virtex5 device, and it was estimated that the throughput was 337 Mbps at maximum clock frequency of 116 MHz. The synthesis for ASIC implementation using a $0.18-{\mu}m$ CMOS cell library shows that it has 13,251 gate equivalents (GEs) and it can operate up to 200 MHz clock frequency.

Partitioning and Constraints Generation for the Timing Consistency in the Hierarchical Design Method (계층적 설계 환경에서 일관된 타이밍 분석을 위한 분할 및 제한 조건 생성 기술 개발)

  • Han, Sang-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.215-223
    • /
    • 2000
  • The advancements in technology which have lead to higher and higher levels of integration have required advancements in the methods used in designing VLSI chip. A key to enable a complicated chip design is the use of hierarchy in the design process. Hierarchy organizes the function of a large number of transistors ito a particular, easy-to-manage function. For these reasons, hierarchy has been used in the design process of digital functions for many years. However, there exists differences in a design analysis phase, especially in timing analysis, due to multiple views for the same design. In timing analysis of the hierarchical design, every path is analyzed within partitioned modules independently and the global timing analysis is applied to the whole design considering each module as a single timing component. Therefore, timing results of the hierarchical design could not be same as those of non-hierarchical flat design. In this paper, we formulate the timing problem in the hierarchical design and analyze the possible source of timing differences. We define a new terminology of "consistent result" between different views for the same design. We also propose a new partitioning algorithm to obtain the consistent results. This algorithm helps to enhance the design cycle time.

  • PDF