• Title/Summary/Keyword: reach forward

Search Result 66, Processing Time 0.026 seconds

Performance Evaluation of Scheduling Algorithm for VoIP under Data Traffic in LTE Networks (데이터 트래픽 중심의 LTE망에서 VoIP를 위한 스케줄링 알고리즘 성능 분석)

  • Kim, Sung-Ju;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.20-29
    • /
    • 2014
  • Recently, LTE is preparing to make a new leap forward LTE-A all over the world. As LTE privides high speed service, the role of mobile phones seems to change from voice to data service. According to Cisco, global mobile data traffic will increase nearly 11-fold between 2013 and 2018. Mobile video traffic will reach 75% by 2018 from 66% in 2013 in Korea. However, voice service is still the most important role of mobile phones. Thus, controllability of throughput and low BLER is indispensable for high-quality VoIP service among various type of traffic. Although the maximum AMR-WB, 23.85 Kbps is sufficient to a VoIP call, it is difficult for the LTE which can provide tens to hundreds of MB/s may not keep the certain level VoIP QoS especially in the cell-edge area. This paper proposes a new scheduling algorithm in order to improve VoIP performance after analyzing various scheduling algorithms. The proposal is the technology which applies more priority processing for VoIP than other applications in cell-edge area based on two-tier scheduling algorithm. The simulation result shows the improvement of VoIP performance in the view point of throughput and BLER.

The Application of Fuzzy Logic to Assess the Performance of Participants and Components of Building Information Modeling

  • Wang, Bohan;Yang, Jin;Tan, Adrian;Tan, Fabian Hadipriono;Parke, Michael
    • Journal of Construction Engineering and Project Management
    • /
    • v.8 no.4
    • /
    • pp.1-24
    • /
    • 2018
  • In the last decade, the use of Building Information Modeling (BIM) as a new technology has been applied with traditional Computer-aided design implementations in an increasing number of architecture, engineering, and construction projects and applications. Its employment alongside construction management, can be a valuable tool in helping move these activities and projects forward in a more efficient and time-effective manner. The traditional stakeholders, i.e., Owner, A/E and the Contractor are involved in this BIM system that is used in almost every activity of construction projects, such as design, cost estimate and scheduling. This article extracts major features of the application of BIM from perspective of participating BIM components, along with the different phrases, and applies to them a logistic analysis using a fuzzy performance tree, quantifying these phrases to judge the effectiveness of the BIM techniques employed. That is to say, these fuzzy performance trees with fuzzy logic concepts can properly translate the linguistic rating into numeric expressions, and are thus employed in evaluating the influence of BIM applications as a mathematical process. The rotational fuzzy models are used to represent the membership functions of the performance values and their corresponding weights. Illustrations of the use of this fuzzy BIM performance tree are presented in the study for the uninitiated users. The results of these processes are an evaluation of BIM project performance as highly positive. The quantification of the performance ratings for the individual factors is a significant contributor to this assessment, capable of parsing vernacular language into numerical data for a more accurate and precise use in performance analysis. It is hoped that fuzzy performance trees and fuzzy set analysis can be used as a tool for the quality and risk analysis for other construction techniques in the future. Baldwin's rotational models are used to represent the membership functions of the fuzzy sets. Three scenarios are presented using fuzzy MEAN, AND and OR gates from the lowest to intermediate levels of the tree, and fuzzy SUM gate to relate the intermediate level to the top component of the tree, i.e., BIM application final performance. The use of fuzzy MEAN for lower levels and fuzzy SUM gates to reach the top level suggests the most realistic and accurate results. The methodology (fuzzy performance tree) described in this paper is appropriate to implement in today's construction industry when limited objective data is presented and it is heavily relied on experts' subjective judgment.

Prediction of the remaining time and time interval of pebbles in pebble bed HTGRs aided by CNN via DEM datasets

  • Mengqi Wu;Xu Liu;Nan Gui;Xingtuan Yang;Jiyuan Tu;Shengyao Jiang;Qian Zhao
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.339-352
    • /
    • 2023
  • Prediction of the time-related traits of pebble flow inside pebble-bed HTGRs is of great significance for reactor operation and design. In this work, an image-driven approach with the aid of a convolutional neural network (CNN) is proposed to predict the remaining time of initially loaded pebbles and the time interval of paired flow images of the pebble bed. Two types of strategies are put forward: one is adding FC layers to the classic classification CNN models and using regression training, and the other is CNN-based deep expectation (DEX) by regarding the time prediction as a deep classification task followed by softmax expected value refinements. The current dataset is obtained from the discrete element method (DEM) simulations. Results show that the CNN-aided models generally make satisfactory predictions on the remaining time with the determination coefficient larger than 0.99. Among these models, the VGG19+DEX performs the best and its CumScore (proportion of test set with prediction error within 0.5s) can reach 0.939. Besides, the remaining time of additional test sets and new cases can also be well predicted, indicating good generalization ability of the model. In the task of predicting the time interval of image pairs, the VGG19+DEX model has also generated satisfactory results. Particularly, the trained model, with promising generalization ability, has demonstrated great potential in accurately and instantaneously predicting the traits of interest, without the need for additional computational intensive DEM simulations. Nevertheless, the issues of data diversity and model optimization need to be improved to achieve the full potential of the CNN-aided prediction tool.

Through SNS and freedom of election Publicized criminal misrepresentation (SNS를 통한 선거의 자유와 허위사실공표죄)

  • Lee, Ju-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.149-156
    • /
    • 2013
  • In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. In this paper, the Constitutional Court's ruling through the SNS was virtually guaranteed the freedom of election campaign through, though, still a large portion of campaign restrictions on public election law provisions exist to this forward in the election is likely to cause a lot of legal problems. Moreover, in the mean time the campaign and which in the course of the election campaign through the SNS, the infinite potential of the growing point than any point spread from the SNS and freedom of election campaign through public election law with regard to the limitation of the diffusion of false facts, awards, a number of problems are likely to occur. You've been in this business and disseminate false guilt disparage precandidacy for true-false, as well. He should be able to reach a specific goal you want to defeat through the dissemination of information which is specified as a crime for this strictly for the fact that disseminate false, rather than to interpret it is the judgment of the Court in that judgment against have been made. Therefore, this strict interpretation of the law and the need to revise or delete before I would like to discuss about. The legislation would repeal the cull of Ron sang first of all point out the issue through analytics. First, the purpose of the data protection Act provides limited interpretation to fit in this world of sin. Secondly, this sin is committed for the purpose of prevention, since the purpose of the objective in this case of sin and the need to interpret strictly. Why I am the Internet space in the case of so-called tweets from followers, this means in some cases done without a lot of the stars because of this, there will be a limit to the punishment of sin, this is obvious. And, in the long-awaited Constitutional Court ensures the freedom of election campaign through SNS and free election in the country, even in the limited sense interpretation opens the chapter of communication is needed. This ensured the freedom of expression will be highly this is a mature civil society that will be imperative.

A Study on the Traditional Costumes and Tattoo of the Maori (마오리族 傳統 服飾과 文身 考察)

  • 황춘섭;정현주
    • The Research Journal of the Costume Culture
    • /
    • v.3 no.2
    • /
    • pp.241-260
    • /
    • 1995
  • The Maori's traditional clothing materials, basic forms of dress, and the pattern and technique of tatoo were examined in the present study in order to deepen the appreciation of the cultural heritage of the Maori. The research method employed was the analysis of written materials. And a fild-trip was also made for the study. The study was limitted to the traditional culture of body adornment of the Maori including the clothing which is preserved and practicing by them at the present day, and the origin and the process of the historical development of those are not included in the scope of the present study. Followings are the results of the study: (1) By far the most widely used fiber for Maori clothing is abtained from what is commonly called New Zealand Flax. The fiber of kiekie(Freycinetia baueriana) and cabbage trees(Cordyline spp.) may also be used. The strong, long-lasting fiber of toi(cordyline indivisa) is used for a prestige warrior's cloak. Flat strips of ti kauka(Cordyline australi) are also used as thatch on rain cloaks. (2) Regardless of technique used, Maori weaving is always worked horizontally from left to right. Traditionally the work was suspended between two upright turuturu or weaving sticks. As the work progressed a second pair of uprights was used to keep the work off the ground. These uprights were moved forward as required. Because the weaver sat on the ground, the working edge was kept at a height that was comfortable to reach. No weaving tools are used, the wefts(aho) being manipulated by the fingers. The two main Maori weaving techniques are whatu aho patahi(single-pair twining) and whatu aho rua(double-pair twining). (3) The Maori wore two basic garments - a waist met and a cloak. The cloth of commoners were of plain manufacture, while those of people of rank were superior, sometimes being decorated with feather or dyed tags and decorated borders. Children ran more-or-less naked until puberty, being dressed only for special events. Some working dress consisted of nothing more than belts with leaves thrust under them. Chiefs and commoners usually went barefoot, using rough sandals on journeys over rough country (4) The adornment of men and women of rank was an important matter of tribal concern as it was in chiefly persons that prestige of the group was centred, The durable items of Maori persons adornment were either worn or carried. Ornaments of various kinds were draped about the neck or suspended from pierced earlobes. Combs decorated the head. Personal decorations not only enhanced the appearance of men and women, but many had protective magical function. The most evident personal ornament was the hei-tiki made of jade or other material. Maori weapons were treasured by their owners. They served on bottle and were also personal regalia. A man of rank was not fully dressed without a weapon in hand. Also weapons were essential to effective oratory. (5) No man or woman of rank went without some tattoo adornment except in extremely rare instances when a person was too sacred to have any blood shed. The untattooed were marked as beeing commoners of no social standing. This indelible mark of rank was begun, with appropriate rite and ritual, at puberty. And tattoo marked the person as being of a marriageable age. Maori tattoo was unlike most traditional tattoo in that its main line were 'engraved' on the face with deep cuts made by miniature bone chisels. The fill-in areas were not tattooed with cuts but with the multiple pricks of small bone 'combs' that only lightly penetrated the skin surface. The instrument of tattoo consisted of small pots of pumice or wood into which was placed a wetted black pigment made from burnt kauri gum, burnt vegetable caterpillars or other sooty materials. A bird bone chisel or comb set at right angles on a short wooden handle was dipped into the gigment, that a rod or stick was used to tap head of this miniature adze, causing penetration of the skin surface. Black pigment lodged under the skin took on a bluish tinge. A full made facial tattoo consisted of major spirals with smaller spirals on each side of the nose and sweeping curved lines radiating out from between the brows over the forehead and from the nose to the chin. The major patterns were cut deep, while the secondary koru patterns were lightly pricked into the skin.

  • PDF

Evaluation of Regional Flowering Phenological Models in Niitaka Pear by Temperature Patterns (경과기온 양상에 따른 신고 배의 지역별 개화예측모델 평가)

  • Kim, Jin-Hee;Yun, Eun-jeong;Kim, Dae-jun;Kang, DaeGyoon;Seo, Bo Hun;Shim, Kyo-Moon
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.22 no.4
    • /
    • pp.268-278
    • /
    • 2020
  • Flowering time has been put forward due to the recent abnormally warm winter, which often caused damages of flower buds by late frosts persistently. In the present study, cumulative chill unit and cumulative heat unit of Niitaka pear, which are required for releasing the endogenous dormancy and for flowering after breaking dormancy, respectively, were compared between flowering time prediction models used in South K orea. Observation weather data were collected at eight locations for the recent three years from 2018-2020. The dates of full bloom were also collected to determine the confidence level of models including DVR, mDVR and CD models. It was found that mDVR model tended to have smaller values (8.4%) of the coefficient of variation (cv) of chill units than any other models. The CD model tended to have a low value of cv (17.5%) for calculation of heat unit required to reach flowering after breaking dormancy. The mDVR model had the most accurate prediction of full bloom during the study period compared with the other models. The DVR model usually had poor skills in prediction of full bloom dates. In particular, the error of the DVR model was large especially in southern coastal areas (e.g., Ulju and Sacheon) where the temperature was warm. Our results indicated that the mDVR model had relatively consistent accuracy in prediction of full bloom dates over region and years of interest. When observation data for full bloom date are compiled for an extended period, the full bloom date can be predicted with greater accuracy improving the mDVR model further.